Most businesses are routinely exposed to security threats of varying severity in the normal course of business, ranging from hackers and malware to disgruntled or careless employees, outdated or otherwise vulnerable devices and operating systems, mobile and public cloud computing, and third-party service providers. Given the pervasiveness and unavoidability of security risks, quick response time is critical to maintaining system security, and automated, continuous security monitoring is critical to quick threat detection and response.