Sure it should and when it doesn't, which security is renowned for not doing, we switch to enclave security models both in the physical world and the electronic. We have seen for instance a total failure of wireless security to stay ahead of the game which has lead to the almost universal pushing of the WPA protected wireless LANs outside the firewall or ideally into its own enclave, it is no longer atypical to see all LANs reduced to a series of VLANS where each client machines see only the reverse mail and file server proxies and the web proxy. The problem set here is fundamentally different from many areas of computing where twice the problem will be solved by twice the power, the reality is the twice the problem needs a different solution in the security world. Though partition models familiar to us from statistics and enclave models borrowed from the physical security world allow us to apply tried and tested solutions to larger environments and we hope to create a hive that can scale it still doesn't mean twice the power, six may be a better rule of thumb.