Network containment and control provides the ability to layer sophisticated auditing, control, and correlation capabilities to protect any networked element across any firewall, VPN, intrusion detection mechanism, or other technology. How does this enable proactive response to threats?
A.
It distributes mitigation points throughout key security-enforcement points in the network.
B.
It examines message-level information to ascertain the ntent?of the applications.
C.
It provides controls that limit the transmission of confidential data or policies.
D.
It aggregates and correlates security information.