One of the biggest complaints I hear about security is the associated operational overhead. IT personnel are constantly adjusting multiple technologies in an effort to provide access to the good guys while locking out the bad guys. If you want to see a metric of this behavior in action, look no further than your network Access Control List (ACL) rules.

I'm a firm believer in service-oriented networks, where security is layered on top of the basic switching and routing infrastructure, protects the network from end-to-end, and is driven by business requirements not security check points.