Accenture's security practice makes use of a number of accelerators when building solutions for our clients. what is the purpose of these accelerators?