As with most new deployments of information-security tools and models, modernizing your network security involves a fair amount of self-discovery, followed by due diligence on potential vendors and, finally, implementation. Here are the steps to follow: