Endpoint security - Continuations