This integration saves time and manpower, reduces attacker dwell time, and speeds incident response before data is stolen or destroyed. It also enables real-time investigations by showing the infected hosts that pose the highest threat risk based on Vectra analysis, and automatically correlates those investigations with logs generated by other devices.