Remember those childhood games of “hide and seek”? All the neighborhood children would get together in breathless anticipation of both finding the best hiding spots and the thrill of being discovered. But the last thing you want when you are thinking about your network security is to play a game of hide and seek with malicious threats like hackers or ransomware.
Sure—your first line of defense is your firewall. But it’s not, if some threat gets inside, but when threats get inside. What is your response? Does finding out what’s happening turn into a game of hide and seek? Or worse—is your approach strictly a forensic one? Wouldn’t it be better to stop the threats as they are happening rather than simply reporting on what happened?