With various IT devices, wireless networks, use of internal IT assets by external users or visitors are increasing.
The security of the internal network drawn from the limitations of physical network connection management is threatened. 
Due to changes in the IT environment, network visibility and monitoring security features are mandatory 
