Source: http://www.computacenter.com/docs/librariesprovider7/gather-content-document/advanced-endpoint-security/computacenter_whitepaper_advanced-endpoint-security.pdf