“When new threats or malware are discovered, we can now identify and act on indicators of compromise within minutes.”