Video: Zero trust access with identity, location, and device context-based policies
Abstract
This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust.
This video demonstrates how identity-based Access Group policies, combined with device posture and location context policies, provide a zero-trust solution that continuously verifies access without relying on perimeter-based implicit trust.
Date published:  | 03/10/2025  | 
Functionality covered:  | Access Groups, Location Context, Device Posture  | 
Description  | A quick demonstration of layered security controls that allow for continuous verification of identity, location, and device.  | 
Length  | 15:29  |