The challenge security leaders face is how to best orchestrate these complementary yet very different technologies ...