This whitepaper explains how the CyberProof Defense Center processes, correlates, analyzes and matches the vast flow of information to detect Indications of Compromise (IoCs), match them to probable threat vectors and trigger alerts for invocation of customized Incident Response (IR) playbooks.