Mechanisms exist to protect the confidentiality, integrity, availability and safety of endpoint devices.