This system’s workflow automation and tracking features enable adaptive response, while including all stakeholders and facilitating information-sharing with other organizations through participating with Information Sharing and Analysis Centers (ISACs).
Removing the power from a computer not only results in lost volatile memory, much of which can be critical to a forensic investigation (and should be imaged), but also may lead the intruder to establish other points of entry.