The network perimeter is dead. Now is the time to up your game in network security, as today’s organizations need to dynamically move data and applications to and from any and all of the following locations: public cloud, private cloud and on-premises. Users require on-demand access from whatever location is most convenient for them. Shadow IT is a new norm for the IT group, which is, at times, unaware of what applications are in use, let alone where the data is. Network security professionals must develop an architecture that secures access to assets wherever they are.