It was only a matter of time as to when cyber criminals turned their attention to large enterprise IT network performance monitoring platforms. Why? Because one successful cyber-attack from cyber criminals or state actors can infiltrate a universally used IT platform to infiltrate many organizations. In light of FireEye and SolarWinds breaches, this begs the question, "Who's Watching the Watcher?" and why you need third-party monitoring tools.