Controlling plan across independent resources is difficult to scale. And the lack of coordination causes blind places.Utilizes vendor threat intel; supports minimal exterior blocklists but often with scale/volume constraintsRegular types filtered visitors by IP handle and port. That wasn’t ample as soon as apps began evading controls and threats