Why Companies Need to Centralize Security Operations: Part 2