Web application firewalls, security information and event management systems, access controls, network security monitoring, and change controls help to keep the "soft center" from becoming an easy target when the __________ fails.
Web
application firewalls, security information and event management
systems, access controls, network security monitoring, and change
controls help to keep the "soft center" from becoming an easy target
when the perimeter fails.