Loading: Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools