Government agencies are under increasing pressure to reduce operational costs while strengthening their defenses against costly cyber threats. Legacy systems and disjointed security tools lead to