Introduction Info-Tech Research Group * Most organizations acquire security tools in a reactive manner. This results in inconsistent security that doesnât meet organizational…