Virtually every hack you have read about in the past decade began as a network end-point computer exploit. Endpoints have many vectors for exploits and by making the end-points secure you eliminate the ability of an exploit to propagate across networks and to other computers. Because Immunity makes it impossible for exploits to propagate or persist, it eliminates the fundamental ability that exploits use to cause damage and steal digital assets and information. In short, they are isolated and stopped before they can even get started, and even before they are ever identified as threats.