From mobile devices to servers and cloud containers, endpoints remain a target of increasingly sophisticated attacks. The success of many attacks relies on compromising an endpoint despite organizations having deployed some form of endpoint protection. Traditional approaches such as antivirus and stand alone NGAV are no longer enough. This paper will help security teams understand the top requirements to look for when pursuing a more modern approach to securing endpoints.