Tipping Point: How Many Security Tools is Too Many?