These days, users are growing more and more accustomed to expecting that they can accomplish productive work from anywhere, at any time, and on any device. As a result, IT professionals are increasingly faced with the challenge of balancing convenience with security, in an effort to provide users with the necessary remote access to corporate applications and data being demanded. In the “old days”, organizations could easily restrict access to internal business data to only corporate-managed Active Directory Domain-Joined PCs, but this is fast becoming an outdated mode of operation.