Learn how you can use AWS Verified Access to enable zero trust access to all your corporate applications and resources on AWS. This session introduces a new feature of Verified Access that supports secure access to resources connecting over protocols such as TCP, SSH, and RDP. Dive deep into how Verified Access allows you to define fine-grained access policies based upon a user’s identity and device security state. Finally, see a demonstration of how using Verified Access improves your security posture, simplifies security operations, and enables zero trust access at scale and with ease.
Learn more:
AWS re:Invent: [ Ссылка ].
More AWS events: [ Ссылка ]
Subscribe:
More AWS videos: [ Ссылка ]
More AWS events videos: [ Ссылка ]
About AWS:
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts. AWS is the world's most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
#AWSreInvent #AWSreInvent2024
Ещё видео!