Traditional boundaries belong to the Past. Whether you like it or not, new devices (tablets, smartphones...) are being used every day to access your IT systems, including business-critical applications. With the Cloud, IT assets themselves are rapidly moving outside of the VPN orbit. Securing multiple device access to your IT assets (CRM, messaging system, EDM, business apps...) is has become a critical component of the IT value-chain. Unfortunately, classical authentication mechanisms, such as tokens, cannot respond to the new challenges: Must be super easy to use, super easy to deploy, cost-effective, and align authentication with your IAM policies.