A. It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B. It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C. It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D. It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.