b'In today\'s cloud-based and mobile-security world, data and applications regularly operate both inside and outside any supposed "traditional" network perimeter, and that makes them tough to secure, say F5 Networks\' Preston Hogue and Greg Maudsley.'