There should be an improvement in the protection of endpoint computers when working outside the office. Currently, they are not protected with any data security when they work from home or outside the network. They surf the Internet directly and should implement a proxy or firewall to monitor the data between the endpoint and the Internet. In future releases, there may be better monitoring and reporting. In the past, there were some situations with vendor utilization where it was sometimes challenging to catch in real-time which user or device was generating excessive traffic, leading to increased utilization. There were some situations where it was easy to catch the source of high utilization through the device. There may be better monitoring or reporting capabilities.