This document introduces the need for a new security model to address the full attack continuum - before, during, and after attacks. Traditional security methods relying on detection and blocking are no longer adequate against modern threats. The threat landscape has evolved to include sophisticated, well-funded attackers employing techniques like zero-days, advanced persistent threats, and industrialized hacking for profit. Additionally, new business models and the growth of the Internet of Everything have expanded networks and attack surfaces. A new security model is needed to provide comprehensive visibility and protection across changing IT infrastructures and against evolving threats.