"Specifically, client machines and other devices connected to a computer network gather data that is used to identify security threats, then transport this data to another computer system where it is analyzed. [0003] 2." . . . . .