Re: Let's see
First you have to detect and prove the 'influence'. (BTW, we've seen cases of it with knock-offs)
Then you have the problem... you've just spend major money kitting out your infrastructure. Now you have to weigh how real the threat is ... of course this gets buried because you don't want to have to rip and replace everything.