This document discusses the need for a new, application-centric approach to cybersecurity. It notes that traditional network perimeter-based security is inadequate and that most security breaches now involve user identities and applications. It promotes governing application access and protecting applications to secure data across cloud, on-premises and future applications. The document advocates for a flexible security architecture using F5 technologies to assess risks, control access, and protect applications based on defined conditions.