When considering data center security, which component is often seen as unimportant but is really the first line of defense?