With cloud application adoption growing, there has been a fundamental shift in how BYOD endpoints need to be secured and managed. Organizations need visibility into the use of cloud applications and understand the risk they