This white paper by Wheatstone's Jeff Keith lays out the case for processing streams, and characterizes our Aura8-IP as a specific tool for this purpose.
Recently we have had a number of tech support inquiries regarding Log4j vulnerability. Because Wheatstone does not use Log4j, there are no Log4j vulnerabilities in any of our products.