Handling cyber Security has been a challenge for organizations over the past two decades. Cyber-attacks have been more sophisticated and stealthier during this timeline. As the IT ecosystem has evolved, the boundary of networks also has increased. This fundamental shift has also increased the threat landscape in the form of malware, APTs, zero-days, and other unknown threats. The cyber-threats today are persistent and operating in multiple vectors such as network layer, system layer, file system layer, in memory, etc.