We live in a digital world where users, applications and data are spread across multiple network environments such as physical locations and clouds. The traditional network boundaries have disappeared, leaving a myriad of smaller network perimeters, as small as a single user working from home. The traditional approach of deploying point solutions to connect and secure those networks has major limitations: increasing complexity and operational costs, lack of control and visibility, and growing risks associated with security inconsistencies and gaps.