Half of all cyberattacks bypass endpoint controls. Here is your six-step guide to unifying your defense and response.