Nobody will dispute that security is necessary to protect a company’s data, but buying any old security package and dropping it into a network isn’t going to cut it. Besides sifting through the seemingly infinite number of security packages out there, managers face the problematic fact that each of them is based on security protocols that have their strengths and weaknesses.