Network firewalls are becoming irrelevant, and we can no longer assume that perimeter networks can be trusted. With adoption of bring your own device and bring your own cloud, we must evolve our defenses to devices and identities. Join this session to explore this new world via rich live demos. (No PowerPoint allowed!)

Learning Objectives:
1: Understand how the security state and trustworthiness contribute to overall security posture.
2: Learn considerations for automated access to resources via device and identity conditions.
3: Discover how to apply these conditions to line of business SaaS apps or on-premises web apps.

Attendees should be familiar with the modern challenges of protecting identity and information in the age of cloud and mobility. Attendees should understand fundamental concepts such as Software-as-a-Service and bring your own device (BYOD).