In light of the increased endpoint security scrutiny, this term can take on many other forms of data that service providers encounter on a daily basis, such as infrastructure diagrams, network architectures, business workflow, or simply a detailed request for a product or solution that would fill a gap or enhance a customer???s security posture.