Skip navigation

Setting Up an Access Policy

Set policies that grant or block access attempts by users and devices based on contextual factors like locations, network addresses, device hygiene and more. This interactive demo walks you through how to set and enforce access policies.

Cover of From MFA to Zero Trust: A Five-Phase Journey to Securing the Federal Workforce eBook

From MFA to Zero Trust: A Five-Phase Journey to Securing the Federal Workforce

Achieving zero trust for the workforce is a journey. In this white paper, we'll take you through a five-phase iterative transformation which ensures users and devices can be trusted as they access systems, regardless of location.

Get the Free Guide