October is Cyber Security Awareness Month, and the past few weeks have accelerated this awareness into mainstream consciousness. Facebook experienced an outage, Twitch suffered a major data breach, and Syniverse quietly revealed a 5-year data breach. It has become starkly evident that organizations need to invest in cyber security solutions, but even more important that these tools work cohesively. It is also becoming apparent that security starts with an identity-centric approach. Putting identity first in security Zero Trust strategies help change the perspective when thinking about security solutions by helping ensure appropriate trust levels are established before access is granted. Evaluating the context of users and devices at the point of access is a key component of any Zero Trust implementation. For those organizations on a cloud journey thinking about Secure Access Service Edge (SASE), the principles of Zero Trust for strong policy enforcement and.