Network security: Is new technology bypassing traditional controls?