In an event-centric approach:
In a relationship-centric approach:
It allows the system to trace attacker activity across multiple machines, forging relationships between event data coming from an organization's existing telemetry source to trace the attackers path, hunt down suspicious activity, and investigate the chain of events to identify the complete attack campaign.