For years the primary focus of security has been securing the endpoints. The problem is that it’s virtually impossible to assure the endpoint is secure. Even if an attacker is successful in compromising the endpoint, it should not enable them to access things like confidential company data, customer information, or other sensitive data. Most encryption solutions are designed to enable seamless access for authorized users. For true protection of sensitive data on an endpoint, you need a way to erase or remove the sensitive data in the event of an endpoint being lost, stolen, or compromised.”]
Source: https://www.csoonline.com/article/2137153/forget-the-endpoints–protect-the-data.html

