Skip to content

Commit 2efeff1

Browse files
committed
add video
1 parent 67b3e53 commit 2efeff1

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

learn-pr/wwl-sci/describe-identity-principles-concepts/includes/3-define-identity-primary-security-perimeter.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,10 @@ Digital collaboration has transformed how and where work gets done. Employees an
33

44
This shift has fundamentally changed how organizations need to think about security.
55

6+
Watch the video that follows to learn about identities and the new security perimeter.
7+
8+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=25959c9a-c652-42fc-af31-cf751e478792]
9+
610
## The traditional security perimeter
711

812
Historically, organizations protected their resources using a *network perimeter*—a defined boundary, enforced by firewalls and VPN gateways, around corporate systems. Security controls at the edge of the network kept untrusted traffic out and allowed trusted internal traffic to flow freely.

0 commit comments

Comments
 (0)