From securityboulevard.com
![Identity Gateways ❤️ Web Isolation](https://blog.authentic8.com/content/images/2020/06/Authentic8_Blog_Banner-1-1.png)
In my previous post, I discussed the adoption of Zero Trust/SASE architectures to address the new risks associated with a decentralized world where direct-to-cloud access renders perimeter gateways and VPN tools obsolete. Specifically, I discussed the critical need to bolster a ZT access strategy with web isolation capabilities when users, devices, browsers, and networks are beyond the reach of IT control.