A. The ability to detect and prevent malicious traffic.
	B. The ability to associate security breaches with a specific user.
	C. Converged management of network and security events, network flow data, and identity information.
	D. Consistent device management across administrative realms.
 
                            