Common Challenges in Deploying Threat Intelligence Protection Systems