Beyond the Perimeter: How to See Every Threat in Hybrid Networks