Securing the Perimeter: An Overview of Endpoint Security