Todayís adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether itís increasingly obfuscating their attacks or hiding malicious code within webpages and other files, itís more and more difficult to profile and identify legitimate network traffic. The situation is likely to get worse before it gets better. Adversaries now utilize agile development and testing approaches to ensure their malware will evade the majority of network security devices deployed to prevent such attacks. This means enterprises need to push for better security and to focus on threats that penetrate our networks, because maintaining traditional perimeter security architectures no longer suffice.