Ensuring malware does not spread from remote users/devices to corporate locations and resources
Consistently and continuously checking the posture of remote devices
Defending an expanded attack surface due to users directly accessing numerous cloud applications