Network Monitoring can alert you about security breaches and intrusions by detecting sudden changes in usage pattern and traffic behavior.
As soon as they find one they try to break in and use your systems for malicious activity. Most of that activity will lead to changes in network usage pattern and to downtimes in your own services. Also keep in mind that the most dangerous threats come from the inside: employees that install or run malicious software either by intention or because they do not know better pose a much larger threat to your network. If that happens you have the problem inside of your network.
The conclusion is that you have to prepare for these threats in two ways: Use pro-active tools like firewalls and intrusion detection systems (IDS) as well as proper monitoring of your network usage. For a new threat your IDS and firewall may not be prepared yet. So only with monitoring you will be able to see intrusions that your firewall or IDS device may not yet be aware of.