How Zero Trust prevents breaches in endpoint folders