Many of today's existing enterprise security infrastructures are the result of an incremental and evolutionary process. As a consequence, they generally comprise a series of point solutions, upgrades, and add-ons that are not seamlessly integrated, creating gaps in their overall security effectiveness. Supporting and maintaining these security solutions requires significant amounts of dedicated staff time, and because of the unknown gaps in security, they are vulnerable to attacks that too often lead to expensive cleanup efforts and/or the theft of a business' private, personal, and confidential digital information. .