. . . "You need tools that provide visibility into the network, both from a wired and wireless perspective, so that you can create and set up policy for different kinds of users based on their credentials, Vance said." .