This document discusses identity-based network security and how it treats the user as the eighth layer of the network stack. It outlines threats like identity theft, data loss, and malware attacks that target users. It then introduces an identity-based firewall and technology that provides application-based control and security centered around user identities, allowing network activity to be identified and monitored by username even with dynamic IP addresses. Reporting and dashboard features are highlighted to provide analytics on top users, denied categories, and logs for different services.