Nearly all existing security and access control solutions were designed before mobile devices came to dominate how we work. They target large complex security users, require detailed training, and assume users spend most of their day in a security role, often working in a Security Operations Center (SOC). They also require on-premise IT infrastructure as well as IT support and involvement.