End point to end point encryption

End point to end point encryption

Is end point to end point enccryption the ulltimate answer to system security