List the assets of the company that are vulnerable to potential threats and get each one of them reviewed by expert security analysts to determine what caused the threats to enter the network.