Many manufacturers are battling with the same question: How can we shift away from numerous security tools that we have, to effectively control data exposure and enforce security policies and be compliant across the dynamic nature of the cloud.