The network security industry is in a constant state of evolution, perpetually responding to new technologies and emerging threats. For every newly discovered cyber threat attack vector, yet another security product is developed to address the shortcomings of existing tools. The process is iterative, and the need for these security technologies is cumulative. Each new product developed is added to the security lexicon but rarely, if ever, are existing tools retired. This evolutionary process has been accelerated in recent years, as new products have emerged to address challenges such as mobile devices, cloud services, and advanced malware.