Рет қаралды 8,760
AWS Verified Access helps you implement secure access to corporate applications without requiring a VPN. Built on Zero Trust principles, AWS Verified Access enables you to set fine-grained access policies for your applications. This ensures that application access is granted only when users meet the security requirements you specify (e.g., user identity, device security status, real-time data such as geolocation). This session provides a high-level overview of AWS Verified Access, its features, and how you can use it to build a Zero Trust architecture.
Learn more about AWS re:Invent at go.aws/3ikK4dD.
Subscribe:
More AWS videos bit.ly/2O3zS75
More AWS events videos bit.ly/316g9t4
ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.
AWS is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers-including the fastest-growing startups, largest enterprises, and leading government agencies-are using AWS to lower costs, become more agile, and innovate faster.
#reInvent2022 #AWSreInvent2022 #AWSEvents