Often traveling to various geographies, field agents can be exposed to mobile app-based, network-based, and device-based threats. These threats seek to exploit mobile
devices as they operate outside the traditional security perimeter, often targeting high
stake users like field agents in particular. Attacks like phishing have also evolved to
take advantage of the fact that existing perimeter protections no longer have visibility
into user traffic. All of these attacks seek to acquire sensitive data.