Attack methodologies change. Threat vectors change. Once-powerful defenses become obsolete. As the pace of these changes increases, it's unrealistic to wait for defense methods to catch up, or for new products to be developed and releases pushed out. Financial enterprises need near real-time host protection, where the bad actors are known to the rest of the world even as they act. The BIG-IP system and the IP Intelligence service at the security perimeter provide the up-to-date network threat intelligence that is independent of attack type.