This document instructs the reader to research two security tools from different vendors within one of five categories: network discovery, network scanning, DLP, firewalls, or HIDS. The reader is asked to identify differences and similarities between the tools, consider implementation issues with each, and create a presentation highlighting their findings. The presentation should compare the two tools and their similarities.