Protecting U.S. cyber assets is a top-level priority in the defense and intelligence communities. To defend the Department of Defense’s (DoD) information networks, cyber analysts must comb through the vast, unstructured volume of cyber defense data to detect, assess, and mitigate cyber threats and act quickly. Faster and more flexible solutions are needed to keep pace with the evolving cyber terrain and ever-increasing amounts and types of data. This dynamic and expanding environment demands that defensive cyber operations run at machine speed— not human speed. In addition to speed and flexibility, security, portability, and accessibility must be factored into any viable solution. And, of course, cost.