Endpoint security – not all are created equal