Securing the Mid-Market Across the Complete Threat Lifecycle