Recommendations
Software architects should look at IPsec to provide application-transparent security. As more and more security breaches occur from within the enterprise, IPsec offers valuable encryption that could minimize security risks. IPsec encryption and authentication are standards-based and implemented in multiple operating systems. You can selectively encrypt data flow on a protocol basis (for example, encrypting LDAP, but allowing HTTP).
As mentioned, IPsec handles one part of a total information security system. The proper hardening and minimization of operating systems, the application of security patches, secure coding, and enforcement of corporate security policies all complement IPsec deployments.