The ubiquitous command-line interface commonly used by many network engineers was cumbersome and restricted visibility to the device and port level, much too granular a view to detect and deflect intruders.
The ubiquitous command-line interface commonly used by many network engineers was cumbersome and restricted visibility to the device and port level, much too granular a view to detect and deflect intruders.