Skip to main content

Video: Zero trust access with CloudConnexa

Abstract

This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust. Additionally, it demonstrates how the use of Applications conceals the private IP addresses of the application servers and the networks to which they are connected.

This video explains how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust. Additionally, it demonstrates how the use of Applications conceals the private IP addresses of the application servers and the networks to which they are connected.

Date published:

03/21/2025

Functionality covered:

Applications, Access Groups, Location Context, Device Posture

Description

A quick demonstration of layered security controls that allow for continuous verification of identity, location, and device. Additionally, it demonstrates how the use of Applications conceals the private IP addresses of the application servers and the networks to which they are connected.

Length

10:35