Organizations can no longer solely rely on reactive or proactive technologies, as attackers have learned how to bypass these and move stealthily within the environment. To effectively combat these threats, organizations must rely on other methods and mediums.