With the transition to mobile, remote and hybrid work models, organizations today commonly support tens of thousands of network-connected endpoints such as PCs, laptops, tablets and smartphones. That has resulted in a greatly expanded attack surface and created a wealth of opportunities for malicious actors.