The document discusses various options for business internet connectivity and perimeter security. It describes the pros and cons of different connection types including ISDN, DSL, wireless, cable, T1/T3, Ethernet, and fiber. It also notes that perimeter security is crucial, as without it a business will eventually be compromised, and that security is best implemented in layers requiring ongoing monitoring and expert support.