How Extensible Technology in IT Operations Increases Your Ability to Keep Your Endpoints Secure