We look at how data center security protocols are changing