you have h.r. data. knowing if someone is on a performance improvement plan or they are at risk of being fire. you also need audit log data. i think organizations get really scared of the edge cases where how would you stop a scenario where i have an employee, his manager is torturing him. there are no hr records of it. he hits the point, that's it, i'm done, i'm going after this guy. he goes and opens up some files and takes pictures on his cell phones. our users are pretty smart. they see cnn and realize you are watching. they tell you, we are watching you. our users know. now, i can go and let's say he takes his phone out and uploads it to wikileaks, how would you detect that? that would be really hard to detect and any ramifications could be big. we can't get hung up in the edge cases. before we can worry about the really, really scary bad stuff, let's solve the 90% of the problems and then we can start to look at the edge cases. like computer network defense, with insider threat, it is not if, it is