TOP 5 SECURITY USE CASES 1 2 3 4 5 9|© Copyright NetBrain® NetBrain Security Use Cases Page 8 Page 10