Information technology recognizes defense in depth as a best practice in system protection. Defense in depth fortifies infrastructure and systems with a layered security approach. Firewalls are stationed at the edge of the network and security mechanisms are usually deployed at every segment. If attackers circumvent the first layer, the next one should net them. In IT, employing a defense in depth strategy involves redundancy: placing multiple iterations of a defensive mechanism in the path of an attacker.