User Behavior Analytics

How proactive is your security team about detecting, investigating, and isolating alerts? Do your current strategies alert you to information systems misuse from within your own organization?