As remote access to business networks increases and as threats against these networks grow, IT executives need to support technology that is flexible and that can combat evolving attacks effectively.