Today's network architecture is complex, with a constantly changing threat environment and attackers constantly looking for and exploiting vulnerabilities. These flaws can exist in a variety of contexts, including devices, data, applications, users, and locations. As a result, many network security management tools and applications are now in use to address individual threats and exploits as well as regulatory non-compliance. When a few minutes of downtime can cause widespread disruption and massive damage to an organization's bottom line and reputation, these safeguards are critical.