Churning through massive amounts of data in near real-time and identifying anomalies as they occur is the holy grail of IT security.