Unfortunately, security cannot be purchased as a turnkey solution. Information security in the data center depends on policies, discipline, tools and technology.
Maintaining information security can be compared to keeping burglars out of a home: reliable door locks (good components) are not effective if people forget to lock them properly beforeleaving the house (bad process).
Locking and checking all doors before leaving on vacation will not prevent someone from breaking in if one of the windows has flimsy locking mechanisms (a single weak component can compromise an otherwise sound security system).
In order to maximize information security, we need to create a good architectural design, and then document and follow the guidelines, procedures and rules that govern the data center (i.e., implement a security policy), and select products and systems that include the features necessary to support those policies and architecture.