Acceleration of network rollout and interconnection has stretched legacy security to the breaking point. Most traditional security systems were designed to analyze and secure data at fixed points in the network, and most network products were not designed with security in mind. This 2-page paper explains the major challenges.