Skip to content

Commit 7733d60

Browse files
committed
update video
1 parent 0dbb330 commit 7733d60

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

learn-pr/wwl-sci/describe-identity-principles-concepts/includes/3-define-identity-primary-security-perimeter.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,10 @@ Digital collaboration has transformed how and where work gets done. Employees an
33

44
This shift has fundamentally changed how organizations need to think about security.
55

6+
Watch the video that follows to learn about identities and the new security perimeter.
7+
8+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=25959c9a-c652-42fc-af31-cf751e478792]
9+
610
## The traditional security perimeter
711

812
Historically, organizations protected their resources using a *network perimeter*—a defined boundary, enforced by firewalls and VPN gateways, around corporate systems. Security controls at the edge of the network kept untrusted traffic out and allowed trusted internal traffic to flow freely.

0 commit comments

Comments
 (0)