Video: Device posture-based policies are a key zero-trust control
This video demonstrates device posture policies in action. Device posture enables the verification of compliance rules, such as disk encryption, the presence of certificates, the use of antivirus software, and specific OS and version parameters, all of which can be continuously assessed for zero-trust access.
This video demonstrates device posture policies in action. Device posture enables the verification of compliance rules, such as disk encryption, the presence of certificates, the use of antivirus software, and specific OS and version parameters, all of which can be continuously assessed for zero-trust access.
Date published: | 03/18/2025 |
Functionality covered: | Device Posture policies |
Description | This video demonstrates device posture policies in action. Device posture enables the verification of compliance rules, such as disk encryption, the presence of certificates, the use of antivirus software, and specific OS and version parameters, all of which can be continuously assessed for zero-trust access. |
Length | 07:40 |