“If a company gets hacked, no CIO wants to have the board ask what happened and say, ‘Damn if I know.’ They want to say, ‘We’re going through log data to find out what happened.”—Eric Ogren, Senior Analyst at 451 Research. Designing a secure network infrastructure has become increasingly difficult. It’s not enough to deploy a stack of security tools like firewalls,