HP HPE6-A88 Question Answer
A company has recently shifted to a zero-trust model and is facing challenges with its legacy network infrastructure, which was not designed for such a model. The company is particularly concerned about the security of its network as it accommodates a growing number of remote users and IoT devices. What solution could help them create role-based access policies and ensure continuous, closed-loop security across their network?

