In today’s mobile environment user connections are fluid. Users disconnect, move to different locations, or access private or public networks. These access changes are often not accessible by a firewall or from guest portals with local authentication. With these gaps in the data, unauthorized devices and users can gain access to the network and introduce security risks.