Cyber security threats are becoming increasingly complex and can often only be detected by looking at data from multiple sources. This includes the logs from point security products, information about IT systems and the data that is used to store knowledge of users and their rights and other contextual information. A correlated view of all this data enables unforeseen attacks to be thwarted as they happen, as well as providing IT security teams with the insight to do their jobs more effectively and improve base security.
Buyer's guide: context aware security
Some things only appear suspicious when looked at in a broader context.