When you are in an environment that is "open" as you state and a perimeter is tough to enforce then the concepts of dwell time and containment become key. Minimize the amount of time intruders are able to loiter on your network before being discovered and then don't allow them to move data out are both considered victories.
When you are in an environment that is "open" as you state and a perimeter is tough to enforce then the concepts of dwell time and containment become key. Minimize the amount of time intruders are able to loiter on your network before being discovered and then don't allow them to move data out are both considered victories.