How Next-Generation Endpoint Security Is Different from Traditional Endpoint Security