(Source: Help Net Security) Cloud-to-cloud edge controls such as highly secure connectivity, fully distributed NDR and web security; and,; Workload-attached policies that can be automated…