This document discusses the evolution of security threats from amateur to professional attackers seeking profit or intentional damage. It also discusses moving security operations from a reactive model to a more proactive and optimized model through intelligent recognition of threats, real-time inspection of systems, and automating response steps. A connected security approach is presented to bridge security silos, turn event data into actionable information through analytics, and streamline security management.