Migration to the Cloud, the rise in mobile and smart device usage and network perimeters becoming edgeless are opening more points of vulnerability, giving attackers an increasing number of access points. In addition, with the increase in demand for fast open access to applications and corporate data by employees, working remotely using BYOD the threat to networks is at an all-time high.