Organizations today have multiple sets of users. Employees, contractors, partners and consumers all need access to critical resources and they access them through a variety of ways – through smartphones, tablets or notebooks. And as we evolve and utilize more and more resources in the cloud, we are no longer bound by traditional network boundaries, exposing us to numerous new threats. And while IT teams deploy multiple tools to help manage the risk involved in having a modern, heterogenous environment, cybercriminals may turn this chaos into their own malicious gain.