In line with Primary’s commitment to strict zero trust principles—every browser instance includes continuous authentication of the user, endpoint, and application identities. Any changes in user behavior, applications behavior, or device posture will modify the trust of that session and trigger enforcement of a policy-based response—i.e. block access, ask for additional factor, etc. Primary uses this Continuous Verification to ensure that remote access to protected services is only conducted through authentic Primary software, on a registered device, by an authorized user on every request from the browser.