Traditional security monitoring is proving to be insufficient in today’s fast-paced digital world of Cloud, Mobile, IoT, and advanced threat landscape. With increasing velocity and volume of data, traditional security monitoring solutions are overwhelmed, and require enormous time and effort to write and maintain rules to detect known threats. Detection of unknown threats is beyond the capability of traditional security monitoring solutions. Thus, the need of the hour is to identify known and unknown threats as quickly as possible, and contain the spread and impact of the infection. This is also known as Threat Hunting, which is a proactive way of looking for threats, using internal and external threat intelligence, hypothesis-based information mining and analysis, advanced malware analysis and behavior analysis