What’s on your Network? 4 Steps to Delivering a Practical, Resilient and Scalable Endpoint Security Strategy