A strategic approach to secure access that meets the requirements of all stakeholders—a frictionless experience for endusers, operational efficiency for IT, centralized policy and distributed enforcement for cybersecurity, and attractive economics for CFOs—is required