For security professionals and forensics investigators, it doesn't get any more basic than the unrelenting flow of log data generated by countless machines attached to the enterprise backbone. The ...