We discuss how you can see patterns across your network based on behavior as well as see more than just user data, and complete the picture of internal and external threats.