var fDesc=new Array(); fDesc[0] = "It provides a holistic view of the entire enterprise regardless of equipment vendor; by leveraging the latest flow technologies, we can provide deep visibility and pervasive security into every corner of the network. The training programs we offer ensure that all our clients are familiar with the forensics available for investigating Internet threats."; function tShowHide(id, show) { var s = document.getElementById("desc"); if ((s.innerHTML.length<=212 || show==1) && show!=2) { s.innerHTML = fDesc[id]; if (document.getElementById('m1')) document.getElementById('m1').style.display='none'; if (document.getElementById('m2')) document.getElementById('m2').style.display='none'; if (document.getElementById('more_txt')) document.getElementById('more_txt').style.display='inline'; } else { s.innerHTML = ''; } }