Defending the Perimeter: Opportunities in the Endpoint Security Market