A customer’s security measures are failing to control all its devices because of inadequate profiling and policy management. As a result, the customer is looking for role-based access and adaptive security policies. Which use case does this customer typify?
A. Guest
B. BYOD simplification
C. Legacy AAA replacement
D. Wi-Fi Analytics