By harnessing the cloud and the ability to constantly update threat data, new products are able to constantly asses endpoints to determine whether they have been compromised. Further the cloud can allow for quick and painless binary analysis in instances which malware is detected. In addition these new SAS technologies allow for foot printing of user behavior across a broad range of endpoints, allowing for the identification of anomalous user behaviors.