Your enterprise security perimeter is now much larger than ever before, perhaps crossing continents and oceans. And like a mutating life form, that perimeter amorphously alters its contour and shape every few milliseconds. No longer is the corporate firewall or virtual private network or router the ultimate arbiter of perimeter security. The perimeter is now defined by the true extremities of the network: the user