9 Computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies; and for protecting computer systems, networks, data, and software from viruses, malware, and web-based threats; segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior