Best practice is to layer security, and the most effective network layer approach is a zero-trust intelligence-based defense. You cannot rely on the stateful firewall layer for an intelligence-based defense as this requires zero-trust and adaptive state tracking based on threat. In almost every public breach a legacy network firewall was deployed and bypassed. One would ask “why were these breaches successful with active firewall technology in place, especially in enterprise environments?” In the following sections, we will explain the differences and capabilities, actual use cases and findings between legacy firewalls and the technologies enabling Centripetal’s CleanINTERNET service.