Preventing attacks
A company must be able to deflect the most common malware strains (understanding that the miscreant is innovating, too). Servers and endpoints must have secure configurations. Vulnerabilities are like loose threads on a shirt; if you tease them out long enough, you can rip apart fabrics at the seams.
Network visibility
Even in small networks, endpoints can be lost or never associated with the network infrastructure to begin with. This can happen for a variety of reasons, including server array configurations, new OS/software upgrades, or power surges. Of course, the best cyberattacks emanate in the dark. A security team must be able to dynamically discover endpoints because this is almost impossible to do through manual processes.
Alarm management
The network administrator or security team knows that something is awry in the network; they have received an alarm telling them so. Alarms can be problematic in three ways. An alarm may conflate a benign event with a security incident. Secondly, an alarm may be a replication and come from redundant sources. Lastly, an alarm could be a false positive; the alarm does not reflect accurately what is happening in the network.