Today’s network infrastructures continue to grow in size, complexity, and functionality. The ever-increasing number of interconnected devices, cameras, laptops, sensors and other assets that traverse a network has placed more pressure on those responsible for ensuring the security and authenticity of the communications traffic moving in, out, and across the network. Moreover, network users are placing greater demands on these infrastructures to support more applications and services, with expectations that the network will accommodate and extend mobility to employees and contractors anytime, anywhere. As network size and scope expands, network operators and security officers are tasked with the difficult job of assuring their enterprise communications remain protected and that their information systems are not compromised by a variety of attack vehicles.