As bring your own device (BYOD) approaches surge, largely driven by requirements to work flexibly with personal and mobile devices, the complexity of the security requirements have surged. To make the challenge even more pronounced, the expansion of the “extended workforce”— contractors, partners, customers, and suppliers— lends itself to new use cases (e.g. new apps, new unmanaged devices) that can’t be managed via exception.