I like that we have been able use this system since day one without any issues other than some minor configuration changes required after initial implementation/deployment of our software stack by another vendor (which was not easy). It is very difficult during an incident response scenario when you are trying figure out what happened exactly as well how it got there - which makes sense due its nature but still requires additional investigation time just because something doesn't make much business logic about why did such thing happen etc.? We were unable identify root cause within few days so had no idea where those threats came form until they hit us again later while investigating previous incidents?