Google had originally planned to release the product later this year. But then the COVID-19 pandemic drastically increased demand for remote worker security.
Context-aware access allows companies to enforce access policies based on a user’s identity and the “context” of their request, such as users’ location, time of day that they are
The vendor developed what it calls internet isolation technology. This separates an enterprise network from the public web while still allowing employees to access the internet seamlessly.
“If I have a threat space that is bounded and measurable, why wouldn’t you go whole hog after it? That is precisely what zero trust and microsegmentation does,” says
The software-defined perimeter category is based on a “zero trust” philosophy in which access is allowed only when the visiting party proves that they are who they say they
The acquisition advances Symantec’s strategy of buying born-in-the-cloud security startups and folding their technologies into its platform to unify cloud and on-premises security.