Security must be holistically included in the end-to-end consolidation process, from assessment and planning to execution and ongoing operations, and organizations should embrace physical and virtual technologies for securing and managing their network security.