How to Objectively Evaluate Security Solutions