Security policy increasingly must deal with mobile units that contain sensitive data and that interact with outside systems. Many companies are using the idea of endpoint security to address this need. "Endpoints are computing devices attached to an organization’s network including PCs, notebooks, handheld computing, or electronic devices with storage, I/O, and/or wireless connectivity, and IP-networked devices with programmable logic controllers used for industrial control
systems and critical infrastructure." This white paper outlines how endpoint security works.