Detecting and protecting from threats requires systems and analysts to proactively and reactively analyze large volumes of data. The volume and speed of the data coming in prevents users from performing even the most basic security analysis for much of the data. Deploying systems to store, organize, and analyze the data is a lengthy and expensive process.