Sorting the SOC Drawer: How to Tidy Up Cybersecurity Tools