Get the details on Zentry secure access services, a new approach to enterprise security built on zero trust principles and zen-like ease-of-use.
The Fall of the Wall
The assumption that internal networks are safe and that everything inside the perimeter can be trusted no longer holds. Networks and locations are no longer practical to establish sufficient trust for access.
Outdated Security ModelsCastle and moat perimeter security models are problematic. Malicious insiders are a major reason for security breaches and the cost of insider attacks keeps rising.
Expanding Attack SurfacesCloud and mobility are creating new attack vectors. Traditional VPNs further expand the attack surface by creating network layer tunnels that extend the perimeter.
Traditional Secure AccessLegacy VPNs allow full network-level access rather than least privilege access, creating security vulnerabilities due to attack, lateral movement and data leakage.
A New Perimeter Emerges
In place of the traditional network perimeter, Zentry establishes a new perimeter – drawn tightly around individual users, devices and resources – to provide consistent, controlled access for any user, anywhere.
Request sent to access gateway, device validation verifies fingerprint and forwards status to Access Gateway.
User Identity, MFA & SSO
User enters credentials, access gateway performs SSO and MFA based on successful user authentication.
Intelligent Policy Engine
Policy engine conducts fine-grained access control checks, authorization is granted or denied.
Secure Access Gateway
Access gateway sends requests to Web apps or Web services broker, secure connectivity is established.
Web Services Broker
Broker delegates requests and Webifies apps, desktops and infrastructure on-premise or in the cloud.