Skip to main content

Video: Zero trust access with identity, location, and device context-based policies

Abstract

This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust.

This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust.

Date published:

03/10/2025

Functionality covered:

Access Groups, Location Context, Device Posture

Description

A quick demonstration of layered security controls that allow for continuous verification of identity, location, and device.

Length

15:29