The majority of Information Security teams’ cybersecurity analysts are overwhelmed today analyzing security logs