In general, the signature-based security products used to defend enterprise networks, such as firewalls, anti-virus products and intrusion detection systems are increasingly blind to modern attack methods, which are increasingly embedded into application data or designed to self-mutate in order to evade detection.