Customers often try to strike the right balance between managing the “threat from within” while at the same time offering their user population access to network resources. The edge of the network represents a unique opportunity to enforce the company’s security posture and acceptable use policy. No longer is it sufficient to merely leverage 802.1x to authenticate and grant users access to the network.


