How do you prepare your security data for visualization?