Perfection in security—the no-breach goal—is not only impossible but also impractical. That’s because sophisticated adversaries have learned to craft their attack techniques to get around preventive security measures such as antivirus, firewalls and passwords. Adversaries also take great care to cover their tracks and stay hidden within IT environments, sometimes for weeks or event months after gaining entry.