Any time a company switches security monitoring software or absorbs a rival's IT infrastructure, its library of ...