Too often, network security relies on placing firewalls in front of public network access points and calling it a day. But with open ports for every partner, contractor and remote user who demands access, the perimeter wall may be nothing more than an initial line of defense.