The technology and procedures that are the foundation of security enforcement are based on the quality and volume of security anomalies surfaced by an organization.