________ feature full-time monitoring tools placed at the most vulnerable points, or "hot spots", of corporate networks to protect against suspicious network traffic and attempts to access files and databases.