As a Security customer, you know the value of buying an enterprise level security technology. Now comes the tricky part, figuring out how to fit this best in breed technology into your existing IT infrastructure. Maybe you have recurring high CPU usage issues, maybe an application which has worked before is now having difficulties, maybe your users are complaining that "Security is blocking our applications, just disable it." Or some combination of the above.
When you buy a new car, the first thing you do is adjust the seat. Change the placement of the mirrors, put on the radio station you want, connect your phone to the Bluetooth, and most importantly - put on your seatbelt. Why would buying a security technology be any different? The default configurations are much like a car without the seat placed right - they are not tuned for your company specifically, but with a few changed, it can be.