Using information security as a response to competitor analysis systems