Explain the idea of orchestration within security. Explain whether or not if this is a good idea or bad idea for security.
Explain what behavioral analysis is from a user and network perspective. Provide pros and cons for both of these technologies.