It's getting tougher to ward off blended threats and intrusions as system attacks become more sophisticated. Fight fire with fire and pit compute cycles against compute cycles to achieve the upper hand.
Blended threats, silent intrusions, zero day attacks and morphing malware are common problems for enterprise IT managers. Attacks and compromises are escalating and the technology behind these attacks is become more sophisticated. Nevertheless, those in charge of enterprise IT security are still responsible for mitigating any and all attacks before damage is done, regardless of the circumstances.
Yet, fighting the latest threats has become an almost impossible chore, simply because attackers have turned to the power of the CPU and are creating learning algorithms that can leverage large amounts of data to uncover zero day vulnerabilities. In other words, the signature-based technologies that are in use will be hard pressed to fight the threats of the future.