For years, cybersecurity products competed almost entirely on technical depth, detection accuracy, integration breadth, SOC ...