Evaluating Inline Security Fabric: Your Key Considerations