Video: Zero trust access with identity, location, and device context-based policies
Abstract
This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust.
This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust.
Date published: | 03/10/2025 |
Functionality covered: | Access Groups, Location Context, Device Posture |
Description | A quick demonstration of layered security controls that allow for continuous verification of identity, location, and device. |
Length | 15:29 |