CyberWire Daily cover image

Cyber spies and vulnerability goodbyes. RedLine Stealer and Vidar: the cryptkeepers. Social engineering TTPs.

CyberWire Daily

00:00

Verified Access: A Smart Proxy for Enterprise Applications

Verified Access gives you that, think of it as a smart proxy capability. You use your SAML token or OIDC token and say, hey, I want access this enterprise application. And there we run a series of security checks on each and every request. So again, it's this constant constantly being verified.

Play episode from 23:41
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app