Security teams have lost visibility into their networks. As recently as a few years ago, network boundaries were well-defined and data and devices easily identified. But a tsunami of new developments means that not only have we lost the boundaries of the network, but we have lost control over how and what is attached to it as well. With technologies such as IoT, IIoT (Industrial IoT) and cloud impacting network visibility, security controls have become less effective. This lack of visibility creates gaps in the overall network security of an organization, making it difficult to see attacks, let alone stop them within the company’s network boundaries. This makes it imperative to rethink the network security architecture to ensure that the necessary visibility is achieved within an organization’s network.