How to Tie Up Loose Ends with Endpoint Security