Author: Stojan Rančić
Learn how to limit unauthorized network and data access by leveraging the Zero Trust Architecture principles - a continuous endpoint authentication and authorization for your IT environment using Cisco technologies.
Author: Leszek Twardowski
Learn how to protect your mobile device if it is offline and how to defend against mobile attacks including phishing, hacking, credential theft and more.
Author: Claus Nussbaum
Zero Trust in Mobile Environments and MobileIron Roadmap.