多项选择题

A. by enabling businesses to leverage investments in the network
B. by spending less time addressing attacks
C. by enforcing policy compliance
D. through admission control