Sits between users and the internet, regardless of which device they are using or where they are located. The cloud-based architecture gives visibility in near real time, even on SSL-encrypted traffic. Because it looks at all traffic, attempts to navigate to suspicious sites are blocked before the request leaves the network. It can also prevent sensitive data leaking, helping users to meet compliance goals. It also inspects reply traffic to identify and stop malware and threats before they hit. It also acts as an identity broker for key cloud applications, such as Microsoft Office 365, Google Apps, Salesforce and Box, to provide secure access and enable Single sign-on (SSO) into these applications.