Articles by topic device-trust
- Mar 23, 2023By Alan ParraThis blog post discusses the weaknesses of the traditional network perimeter security model that relies on VPN and firewalls and proposes an alternative approach called device trust. With details on the components of device trust, including device inventory, device challenges, and enrollment, and provides examples of how device-aware authentication works in practice.