"As we think about how that malware progresses through its life, it starts as just a threat. It’s not inside your business. It moves to an infection that’s now inside your business. It then starts to communicate back to its command and control. Ultimately, we’re trying to stop this before it hits the breach."
"We have a volume problem and a resource problem. How might we resolve that? The basis of the proposal here is you take that and you kind of blow it up for a second. I'm not saying blow it up, but to think about it in a different way."