Enterprise network architectures are in a constant state of flux, and due to a lack of resources and knowledgeable security expertise, some businesses are unable to maintain ongoing security best practices that include proactive security planning and ongoing optimization. Because today's security threats are so stealthy, it is often difficult to impossible to perform root cause analysis to determine how a breach or potential breach event occurred. Without actionable information produced by a root cause analysis, enterprises are unable to develop countermeasures for existing security gaps, and consequently, their businesses continue to be exposed. .