Johannesburg, 11 Apr 2017
Cryptzone, the Software-Defined Perimeter company, announced the newest version of AppGate, which enables organisations to easily deploy a software-defined perimeter (SDP) for granular access control. The release of AppGate 3.0 furthers Cryptzone's vision for transformational network security - where all network services adopt an identity-centric security model.
We see almost daily that traditional approaches to network security - firewalls, DMZs, VPN, and NAC - are failing to protect enterprises. AppGate 3.0 instead employs an "authenticate first, connect second" approach for improved security. All users are validated with multi-factor, context-sensitive authentication, controlled by dynamic policies rather than static rules, before they're permitted to connect to network resources.
"It's clear that organisations need the security benefits provided by a Software-Defined Perimeter, and we are thrilled that vendors like Cryptzone have created Software-Defined Perimeter systems that are enterprise-ready," said Jim Reavis, Co-founder and CEO of the Cloud Security Alliance. "We anticipate continued growth in SDP adoption this year, as organisations recognise the value and necessity of taking a new approach to security."
AppGate 3.0 extends support for the software-defined perimeter architecture:
* All services are hidden behind Gateways, ensuring that only authorised users can access them.
* All AppGate components are protected by Single-Packet Authorisation (SPA), ensuring that even the AppGate entry point appears "dark" to unauthorized users.
* All users are authenticated prior to access, and access is controlled by dynamic policies that adjust to changes in server, user, and overall system and device attributes.
* Enhanced capabilities detect and respond to malicious or unauthorised attempts at network access.
* Enterprises can easily and securely deploy services across their hybrid infrastructure, including public cloud infrastructure - from a single, centralised console.
AppGate's transformational network security approach enables security teams to enthusiastically "say yes" to business requirements. For example, a large US-based transportation company decided to outsource management of key systems and applications to a remote third-party vendor. These users required access to on-premises applications, but the company's security team needed to limit their network privileges. With AppGate, they were able to precisely configure network access for these remote users with a simple set of policies, while maintaining the user experience and the network infrastructure. They were also able to easily meet compliance and audit reporting requirements associated with the outsourcing project.
For more information about Cryptzone's AppGate solution, visit: https://www.cryptzone.com/products/secure-access/appgate
Share