As corporate employees are now regularly accessing their enterprise applications and data from mobile devices and cloud applications, the traditional idea of the enterprise network boundary is vanishing. Enterprises are grappling with the reality where the network perimeter is defined by the employee identity. Securing this “Identity Perimeter” and managing identities’ access to applications and mobile devices has become a complicated calculus. Along with the push to the cloud, hackers have increased their use of the tried-and-true techniques of using phishing and account takeover schemes to capture enterprise data. The financial costs of attacks continue to grow. According to the 2015 Ponemon Institute study, the typical breach costs organizations $3.5 million — a one year rise of 15 percent in cost. The CISO’s job to make sure their organization doesn’t incur the cost of a breach and loss of sensitive information— as such, their primary concern is securing information.