A breach analysis process often must find a balance between functionality and performance. Initial toolsets can rapidly identify indicators of compromise, while final toolsets enable deep-data analysis but at the cost of additional time and resources. Organizations must decide when it is appropriate to use tools that will accelerate the forensic identification process but still provide an accurate assessment of the breach event. The second in a two-part series on incident response, this brief discusses the goals of breach analysis as well as its different phases and tools. Why is it important for organizations to understand each phase of this process? Read on for more on breach analysis and the way in which it can help your organization efficiently manage incoming threats.