Traditional network security focuses on perimeter defenses. Once inside the network perimeter, users are “trusted” and often given broad access to many corporate resources. But threat actors can come from inside or outside the network, and several high-profile cyberattacks in recent years have undermined the case for the perimeter-based security model. Moreover, the perimeter has become less relevant due to the growth of cloud computing and changes in the modern workforce such as increased mobility and Work from Home.