$ 0 0 With effective monitoring into endpoint activity, threats to the network can be detected and neutralized before causing extensive damage.