Protected Connection To stop questionable traffic from making its way onto the network, learn how a standards-based NAC approach works. By Lisa Lorenzin 8/20/2009 <a href="http://fedtechmagazine.com/article.asp?item_id=619" rel="nofollow" target="_blank">http://fedtechmagazine.com/article.asp?item_id=619</a>