In part 2 of our series on moving beyond the perimeter (read part 1 here), Duo’s Principal Security Strategist Wendy Nather explains how you can build a new security model within your organization.
- Enrolling users/endpoints into inventories
- Identifying endpoints as ‘trusted’ w/certs
- Enforcing access policies based on validates users/endpoints
Check it out!