In order to solve many advanced information security use cases, one must correlate historical vulnerability scanning information alongside information garnered from other security technologies such as SIEMs, Ticketing, IDS/IPS, NAC, Deception technologies, and many others. However, to best achieve these use cases, a difficult correlation challenge related to normal IT changes across time, must be overcome. This session covers three specific advanced security use cases achieved by integrating vulnerability management, with other security technologies. The session includes a demonstration of use case related to an incident response program, and solved by a security technology.