Use Cases of Endpoint Security