The need for complete network security has never been greater nor as well understood. Malicious users
threaten to steal, manipulate, and impede information. Numerous solutions address perimeter defense,
but the greatest threat of information theft and unauthorized access remains within the internal network
One point of concern is the relative ease of physical and logical access to a corporate network. Both
physical and logical access has been extended to enable a greater level of mobility, providing several
benefits to business operations and overall productivity. However this greater level of mobility,
combined with very limited security solutions, has also increased the...