A Gigamon Whitepaper:
SOC AUTOMATION OF THREAT INVESTIGATION