In some embodiments, the system is also configured to control and instruct intrusion network and security system measures such as intrusion detection systems, and other devices automatically with respect to preventing, defending, or otherwise taking steps against attacks, exploits, and other activities based upon the raw vulnerabilities discovered.