Which two options are features of the endpoints threat-centric solution? (Choose two.)