Endpoint Security: 6 important components and challenges for deployment