Consider user experiences of all kinds. In the case of security solutions like ours, the cybersecurity intruder is also a user (although in most cases they aren’t aware of their usage). This is among the hardest issues to understand, how will the adversary test your solution, evade your solution, or disable its proper operation. Seasoned security professionals will understand this and hold your feet to the fire to provide a proper response. For example, detecting the evasion tactics of an adversary, and countering those must be part of the solution. Otherwise, the solution will have a very short shelf-life. Adversaries are very very good. They study defenses. Defenders should study them.