Many of today’s security models spend a lot of time focusing upon network segmentation and authentication.  […]