Logging and monitoring are the most important techniques in today's threat landscape. Logs and monitoring data is the basis for later analysis and behavioral analysis of network traffic, user actions, failed processes, and more. The more data you have, the more likely you are to find an anomaly or a pattern that can be used for automated threat analysis.
But as data is nothing without former analysis, the visualization and analytic tools are as important as the behavioral threat detection tools.