MENDEL CLOSES THE SECURITY GAP Use Case Case Study Network Security Operational Monitoring Network Security Integrated Threat ResponseNetwork Security Detection of Known ThreatsNetwork Security Non-availability of ServicesNetwork Security Password Misuse and AttacksNetwork Security Anomalous Data Transfer or Data LeakNetwork Security Advanced Persistent ThreatsNetwork Security Illegitimate Access to ResourcesNetwork Security Breach of Internal PoliciesNetwork Security Network ReconnaissanceNetwork Security Detection of RansomwareNetwork Security Forensic AnalysisNetwork Security