Vendors’ dash to “own” the cybersecurity dashboard is intensifying as products vie to be the source of faster assessments, more useful security priorities, and a fully integrated attack response.