Is an attacker hidden in your network?
Today's security tools are focused on prevention and protection against threats and attacks. There are several tools on the market providing this solution. However, modern approach should be very different. Detection and reaction on security breaches should be the main focus of secured networks. And the best way to detect an event is to monitor what is happening in the network. Do you really know what, who, where and how is doing?