We've launched out of stealth, read more here!
Identity is the new perimeter. 



Protect access to your organization critical resources to mitigate risk of unauthorized access, data breaches and operational disruptions.

Sources

The Source is the resource where the authentication process is instigated to a target Destination resource.