1: Understand how the security state and trustworthiness contribute to overall security posture.
2: Learn considerations for automated access to resources via device and identity conditions.
3: Discover how to apply these conditions to line of business SaaS apps or on-premises web apps.
Attendees should be familiar with the modern challenges of protecting identity and information in the age of cloud and mobility. Attendees should understand fundamental concepts such as Software-as-a-Service and bring your own device (BYOD).