Security ArchitecturePost-connect network visibility: A fox in the henhouse for network securityRick LeclercApril 30, 2013It's critical that organizations looking to protect themselves from threats introduced via mobile devices look for a solution that identifies devices and applies access policies BEFORE allowing devices on the network.