Mechanisms exist to facilitate the implementation of endpoint security controls.
Does the organization facilitate the implementation of endpoint security controls?