How Endpoint Security Works