Discovery of hidden performance opportunities, Finding of Vulnerabilities, Intrusion Detection System, Prevention of security breaches and threats.