Can you mitigate your remotely exploitable nodes? Of course you can't. Do you know how to configure your VPN server racks with AJAX overlays? Don't even pretend you do. What happens if an unauthorized user interface tries to query your Oracle® detection points? Do you know what to do then? Duh. Of course you don't. You're not smart.
We know how to program in every language. We invented most of them. We have rooms full of software engineers who do nothing all day but write programs that are so advanced that they don't do anything because the hardware needed to run them hasn't been invented yet.
We have a whole building full of Dual-Core SMTP network servers that host integrated database CSS functionality for our clients. You know those really tall, glass buildings that you see from the freeway and, as you drive by, you go "I wonder what they do in there?" That's where we work. And you can never get in there because there's so much secret technology inside that no one is allowed in.