Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
MicrosoftIdentity and Access ManagementSecurity
Video
•
3
views
•
6:48
•

August 27, 2025

Zero Trust Identity: Microsoft Entra ID

Zero Trust Identity: Microsoft Entra ID establishes Entra ID as Microsoft's cloud-based identity and access management service, serving as the central hub for user access. It highlights key capabilities like Single Sign-On (SSO), Multi-Factor Authentication (MFA), and user provisioning, all crucial for explicitly verifying identities in a Zero Trust framework.

Module 2 provides a detailed breakdown of the three core principles of Zero Trust. It focuses on the "what" and "why" behind this security model, explaining why traditional perimeter-based security is no longer effective. Through clear and engaging visuals, the video defines Verify Explicitly by demonstrating the need to authenticate every user and device, every time. It then explores the principle of Use Least Privilege Access, showing how to limit permissions to only what's necessary for a user's task. Finally, it covers the Assume Breach mindset, illustrating how an organization can build systems to continuously monitor and contain threats, rather than just trying to prevent them. This video serves as the essential conceptual foundation for a successful Zero Trust journey.

Technologies

Featured speaker

Matthew Raida

Softchoice

Contributors

Matt Raida
Manager, Workplace Practices
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies