A security system detected a phishing alert. A prioritization tool then enriched the alert with additional data and assigned it a threat score of 79, just below the threshold of 80. Without automation, reviewing, analyzing, accessing, and remediating the phishing alert would take a total of 2 hours and 10 minutes.