(Source: Network World) While some of the physical security appliances for perimeter protection will remain to protect all traffic entering and leaving the datacenter, internally, it becomes more difficult to determine when, or even if, security appliances are deployed. Virtual security appliances and other virtual security software become essential.