READ. processes human-authored, unstructured CTI reports into structured CTI data. This machine-readable data can then be fed directly into a TIP or defensive systems for security analysts to operationalise. Data Extraction, STIX Processing and Output is completed seamlessly within READ. allowing analysts to pivot from extensive CTI documents to valuable, actionable data within seconds.