. . "Further, what is needed is a system that can detect executable content and quickly identify and categorize its behavior, and provide protection from the malicious content to a high volume of client computers with minimum delay." . .