. . . . . "Most customer organizations do not authenticate endpoint devices in any way, leaving them susceptible to attacks launched from desktop and laptop computers, USB drives, MP3 players and other portable devices." . .