When data and applications move to the cloud, user access—by default—takes place remotely. Organizations therefore have to implement user access controls for enterprise resources residing both in the cloud and within the confines of the data center. With enterprise security perimeters becoming increasingly blurry, organizations are having difficulty affording, implementing and managing consistent, unified access policies to distributed IT resources