Download Historically, companies believed that if you threw enough technology against the network perimeter, you could stop malware or intruders. That's no longer the case. Recognizing a breach in your network requires visibility in the traffic itself. SC Magazine asked its readers just how much visibility they have into their network activity. The answers might surprise you.