The traditional perimeter which protected IT assets on the corporate network has become irrelevant. The proliferation of cloud-based services, such as email and online file sharing, being used to augment conventional in-house IT systems, and the rise of mobility where remote access from anywhere is required by your employees, partners and even…