Assess the security posture of your endpoints, devices, and IT environment