An event, such as a security-related event, is received from a first
security engine or another source. A second security engine is identified
that is configured to utilize information contained in the event. The
information contained in the event is then communicated to the second
security engine. Additionally, other information, such as system state
information, can be provided to one or more security engines.