Advertisement
Authentication used to be binary: I give you access or I don’t give you access. But with the rise of remote/hybrid work and the growing number of cloud applications in use, organizations need an even more precise approach to authentication, says Ash Devata, vice-president and general manager of Cisco Zero Trust and Duo Security.
“Every time you’re giving access, you have to inspect the user [and] inspect the device,” Devata says. “End users just want to get their work done. They don’t want to go through all the security checks.“