Digital Government Use Case: Isolating Threats Inside the Network