Traps Advanced Endpoint Protection (Secure the Endpoint)
This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits – known and unknown – before any malicious activity could successfully run. We call this “advanced endpoint protection.” By focusing our solution on the attacker’s core techniques and putting up barriers to mitigate them, the attacker’s path for exploitation becomes known, even when the attack isn’t.
Source: https://www.gsa.gov/portal/mediaId/131294/fileName/GSA_CDM_ProductGuide_2016-03-11d.action