A. The ability to detect and prevent malicious traffic.
B. The ability to associate security breaches with a specific user.
C. Converged management of network and security events, network flow data, and identity information.
D. Consistent device management across administrative realms.