In the past, network functions such as routing, intrusion prevention, and intrusion detection were carried out by specially designed hardware appliances, each designed to run proprietary software specific to a single purpose. While these appliances did their job remarkably well, they presented a barrier to agility that today’s businesses simply cannot afford to maintain. By […]