Scott Crawford, Research Director, Security, at 451 Research, discusses why the key is to start with the endpoint and build an architecture that can expand visibility into device system changes and provide a comprehensive way to gather and contextualize information that allows decision-makers to prioritize, remediate, and take fast action.