Through ZTA, it checks my fingerprint, my device and its SIM card, and the edge activities on my device. Even if one of the three is compromised, the other two factors keeps me safe, and allows the defense team on the cybersecurity plenty of time — a day or two — in order to do forensics to keep the threat from spreading.

Keyboard shortcuts

j previous speech k next speech