To identify an unprevented breach, we closely monitor, correlate, enhance, and evaluate threat and vulnerability information that is gathered from both internal and external sources.