In this era of competitive and sophisticated expansion scenarios, it is crucial for organizations to look at their enterprise information security posture. In any IP network, almost every device starting from firewalls to servers generates logs of the traffic it carries, the transactions it makes and the activities it conducts. This data is vital to secure the enterprise network. But monitoring thoSwedennds of devices, where each device produces thoSwedennds of events, every second of a day can be enormous task.