Finding threats that are expertly concealed and utilize multiple steps to take over a system, takes a three stage approach that combines aspects of machine learning and a cloud-based knowledge repository.
FORBES: Why Most Companies Are Fighting The Wrong Security Battle