This allows the information security group know how many endpoints are on the network at any supplied time, in which they are located and what exercise is getting carried out on Each individual.The traditional signature-primarily based detection strategy identifies known malware by comparing file signatures in opposition to a databases of previousl