As organizations continue to “go digital” and become more connected, they open their networks and internal applications to remote employees, customers, business partners, 3rd party vendors, mobile devices, and connected devices. Enhanced connectivity is necessary to remain business-relevant, but it comes at a cost; Research shows that six out of ten organizations around the globe have suffered at least one cyber-attack on their enterprise services. This shouldn’t be the case in our technologically sophisticated world. But it is, because organizations typically expose their services to the internet in order to interact with their many 3rd party vendors and external partners. The fact is that organizations are still using legacy methods such as VPN and virtual desktop solutions of designing perimeter networks that don’t account for modern connectivity and application access challenges. It is clear that organizations need a paradigm shift to overcome the challenges of providing simple, cost effective, and transparent access to internet facing services, while effectively combatting cyber-attacks and threats.
Safe-T’s Zero Trust Network Access (ZTNA) solution, Secure Application Access, is changing the way organizations grant secure external access to their services. SDP+ offers secure and transparent access for all types of entities (people, applications, and connected devices) to any internal application, service and data, for example HTTP/S, SMTP, SFTP, SSH, APIs, RDP, and WebDAV. SDP+ implements Safe-T’s patented reverse-access (outbound) technology which eliminates the need to open incoming ports in the organization’s firewall. Remote Worker Remote Applications Contractor, 3rd Party Vendor, Partner Public Cloud Authentication Gateway Finance App File/Data Storage RDP DMZ LAN IAM Firewall Email Business App Access Gateway Firewall Access Controller IAM Services Cloud Services Features Safe-T Reverse Access Inside-out protection User Behavior Analysis Dynamic, AI-based behavior anomaly detection SMB Proxy Access Encapsulated, exploit-safe SMB Non web protocols ready RDP, SFTP, SSH The solution forces users to authenticate into resources first and then they are granted access by the solution. Configurable policies define the orchestrated authentication steps that each user or group member must perform. Now, backend services are not visible to unauthenticated users and the probability of suffering a successful attack is minimized. It’s like we always say here at Safe-T: If you can’t be seen, you can’t be hacked®. To prevent authenticated users from performing unauthorized operations, Safe-T’s Secure Application Access provides user behavior analytics (UBA) capabilities that monitor the actions of protected applications. A dashboard displays security related events and aggregated statistics. Administrators use the dashboard to inspect details about anomalous behavior that can trigger alerts and identify suspicious activities