Every security leader has, at one time or another, been faced with the challenge of maximizing the value they get from their existing toolset.