Software that is granted root access on monitored computers has full administrative control over those systems and therefore can constitute a single point of failure if that software is breached.
high
temporal
Security trade-off associated with endpoint monitoring tools that require deep system privileges