The coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise, based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.