<s>
Software-defined	B-Architecture
protection	I-Architecture
(	O
SDP	O
)	O
is	O
a	O
computer	O
network	O
security	O
architecture	O
and	O
methodology	O
that	O
combines	O
network	O
security	O
devices	O
and	O
defensive	O
protections	O
which	O
leverage	O
both	O
internal	O
and	O
external	O
intelligence	O
sources	O
.	O
</s>
<s>
The	O
SDP	O
architecture	O
partitions	B-General_Concept
the	O
security	O
infrastructure	O
into	O
three	O
interconnected	O
layers	O
.	O
</s>
<s>
The	O
Enforcement	O
Layer	O
of	O
SDP	O
enables	O
organizations	O
to	O
design	O
segmented	O
networks	O
,	O
implement	O
physical	O
and	O
virtual	O
security	O
enforcement	O
points	O
based	O
upon	O
that	O
segmentation	B-Architecture
,	O
and	O
execute	O
the	O
protection	O
logic	O
for	O
the	O
prescribed	O
network	O
segments	O
.	O
</s>
<s>
SDP	O
incorporates	O
the	O
principal	O
of	O
segmentation	B-Architecture
into	O
the	O
Enforcement	O
Layer	O
.	O
</s>
<s>
Segmentation	B-Architecture
divides	O
a	O
network	O
into	O
compartments	O
that	O
have	O
different	O
security	O
characteristics	O
.	O
</s>
<s>
Enforcement	O
points	O
may	O
be	O
implemented	O
as	O
network	O
security	O
gateways	O
,	O
host-based	O
software	O
,	O
mobile	O
device	O
applications	O
,	O
or	O
virtual	O
machines	O
in	B-Architecture
the	I-Architecture
cloud	I-Architecture
.	O
</s>
<s>
Security	O
Solutions	O
commonly	O
implemented	O
within	O
the	O
Control	O
layer	O
include	O
firewall	B-Application
,	O
anti-virus	B-Application
,	O
application	O
control	O
,	O
threat	O
emulation	O
,	O
anti-bot	O
,	O
anti-spam	O
and	O
email	O
security	O
,	O
data	B-Application
loss	I-Application
prevention	I-Application
(	O
DLP	O
)	O
,	O
and	O
intrusion	O
prevention	O
systems	O
(	O
IPS	O
)	O
.	O
</s>
<s>
This	O
layer	O
supports	O
the	O
enterprise	O
segmentation	B-Architecture
and	O
enables	O
the	O
definition	O
of	O
access	O
and	O
data	O
control	O
policies	O
and	O
the	O
activation	O
of	O
threat	O
prevention	O
separately	O
.	O
</s>
