Stichworte: circumvent traditional endpoint security solutions