The need for ironclad IT security and response systems is at an all-time high. With hackers devising trojans and malware worms every day to thwart security systems worldwide, network security is an ever-changing landscape. What can a company do to keep the gate closed on unwanted intrusions? When an intrusion is detected, what can a company do to quarantine the intrusion?