Thinking back years ago, managing IT security often meant locking your critical applications and services in a room, maybe a big room depending on what decade we are talking about. Much like an alligator moat around a castle, you could sleep easy knowing not much could infiltrate your protection. Just as technology has evolved, so have the threats. The threat landscape changes daily. In today’s highly collaborative, highly mobile business world, with an enterprise that no longer has a physical boundary, a locked room isn’t an option—and forget about the alligators.