ZERO TRUST
Authorize user and resource access based on identity
Keep your existing identity provider and MFA. Define policies that are aware of factors like the endpoint security posture, location, and application context to make intelligent access decisions.