The Zero Trust Security approach ensures the right people have the right level of access, to the right resources, in the right context, and that access is assessed continuously - all without adding friction for the user. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for various users – employees, partners, contractors, etc. – regardless of their location, device or network. Register & attend this webinar as we join Okta to discuss: The evolution of Zero Trust and how we got here. What the maturity model for Identity in Zero Trust looks like.