The traditional enterprise perimeter, built to separate trusted users from bad actors, is dissolving. What once defined a company’s perimeter has expanded for modern, hybrid, distributed, and borderless enterprises. These enterprises are moving to software-as-a-service.
(SaaS) applications, and employees and the extended workforce (e.g., remote workers, partners, customers, outsourced IT, and contractors) are working remotely (adoption of mobile), each one connecting from various devices to different applications, both in the cloud and on-premise. As a result, enterprises have limited visibility into, and control over, who has access to resources, apps, and devices, thus posing security and compliance risks to organizations.