Identifying, monitoring, tracking an of external threat. (Hacking, theft, harassment, etc.)
Problematic internal employee or resource tracking, monitoring, and mitigation. (AUP violations, termination policy enforcement, internal hacking, etc.)