As IoT and edge systems grow more interconnected, the issues of security and complexity are becoming increasingly evident. Organizations face a new set of challenges as they extend their security infrastructure to a distributed environment that has no perimeter, is heterogeneous, encompasses devices that may be too constrained to run traditional security tools, and operates at a scale that may run into tens of thousands or more. Deploying security and network functionality efficiently in distributed environments while safeguarding both legacy and modern IoT and edge devices is a demanding and time-intensive process.