Organisations are facing ongoing threats by malicious attempts from individuals and organisations to gain unauthorised access to systems, data and facilities. It is crucial that the right people have access to the right information over a trusted infrastructure with processes that are easy and efficient to manage, scale and grow.