Our more mobile, distributed workforce has become dependent on a diverse collection of digital communication and collaboration tools, expanding the attack surface and creating new opportunities for adversaries to evade security controls. Many organizations currently lack visibility and control of one or more of the many tools their workers depend on. While email security strategies remain critical, new, more comprehensive security strategies are needed that are capable of monitoring and protecting sensitive data and access to both sanctioned and unsanctioned tools.