EDR solutions include a variety of endpoint technologies ranging from application protection and privilege management, whitelisting, execution isolation and comprehensive visibility and control. While the secure proxy remains the most critical control point with complete visibility and control in the network, the intelligence and actionable data that can now be gathered from endpoint devices, such as Windows PC's and Linux machines, is extremely useful for the security operations and incident response teams. As a result, it is critical that organizations are able to connect the in-depth traffic termination and inspection capability that only a proxy can provide, to the host-level visibility and remediation capabilities within EDR.