Defending Devices, Data, and Users: The Impact of Endpoint Security