There are so many endpoints you just don’t have visibility into, or can’t manage, with endpoint protection and detection (EDR) alone. Consider IoT devices that can’t have an agent installed on it, connected printers in your environment, or rogue laptops or mobile devices that employees and contractors bring onto your network.