What we're doing is essentially the reverse of what a protocol analyzer does. A protocol analyzer examines the network for behavior or code that's out of line with standards or thresholds. Our security analyzer actually creates paths that are out of line with the protocols to identify vulnerabilities that may not have been detected yet.

We want to do it more out of the box.