attention to such things as user identity and authentication and system assurances, as well as additions to network defenses.Breadth is achieved by including such people as a company???s business partners as well as service providers and even law enforcement agencies as part of an enterprises??? security ecosystem.