A company has established a network-level connection with several business partners to facilitate business
transactions. Each business partner interacts with the same four application servers within the company.
Which of the following defense types should the company implement to protect the remainder of the
organization from those partners?