Endpoint Security Strategies: Protecting Devices