Are Overlapping Security Tools Adversely Impacting Your Security Posture?