Watch this video on YouTube
An enterprise has decided to adopt a unified method to identify potential security breaches. Why might an organization opt for such a centralized identification mechanism?