Analyzing Output from Security Technologies