As they transition, Federal agencies must continue to defend against threats on their existing infrastructure while extending that protection to the exploding number of remote endpoints connecting to their networks.