Zero Trust is a network security model, based on a strict identity verification process. The framework dictates that only authenticated and authorized users and devices can access applications and data. At the same time, it protects those applications and users from advanced threats on the Internet.
Zero Trust Network Access (ZTNA) is a category of technologies that provides secure remote access to applications and services based on defined access control policies. Unlike VPNs, which grant complete access to a LAN, ZTNA solutions default to deny, providing only the access to services the user has been explicitly granted. It is important to understand the security gaps and benefits ZTNA solutions can provide organizations as more remote users join the network.
How ZTNA works
With ZTNA, access is established after the user has been authenticated to the ZTNA service. The ZTNA service then provisions access to the application on the user’s behalf through a secure, encrypted tunnel. This provides an added layer of protection for corporate applications and services by shielding otherwise publicly visible IP addresses.
Israeli Innovative companies in ZTNA
Safe-T provides software-defined access solutions that mitigate attacks on enterprises’ business-critical services and sensitive data. Safe-T hides data at the perimeter, keeping information assets safe and limiting access to only authorized and intended entities in hybrid cloud environments.
The company’s solution enhances operational productivity, efficiency, security, and compliance by protecting organizations from data exfiltration, leakage, malware, ransomware, and fraud. With Safe-T’s patented, multilayer software-defined access, financial services, healthcare organizations, utility companies, and governments can secure their data, services, and networks from internal and external data threats.
Safe-T was named a cool vendor in “Cool Vendors in Mobile and Wireless, 2015” by the Gartner Research Group.
Ericom Software provides zero-trust secure-access solutions that protect organizations from advanced cyber-security threats. Leveraging isolation technology and software-defined perimeter principles, Ericom solutions enable simple, secure, policy-driven access to mission-critical cloud and on-premises business systems and resources, including the public internet, without impacting end-user productivity.
Thousands of companies rely on Ericom’s platform for remote access, secure connectivity, isolation, mobility, and virtualization technologies to enhance their cybersecurity and productivity while reducing complexity and cost. The company is an active member of the Cloud Security Alliance and has offices in the United States, United Kingdom, Europe, Middle East, and Asia, and a global network of distributors and partners. https://www.ericom.com/
Akeyless’s Vault Platform is a unified secret management system that enables users to store, protect, rotate, and dynamically create credentials, certificates, and encryption keys.
The company’s platform supports several use cases, including managing static or dynamic credentials, certificate automation, encryption and digital signing, data protection, and zero-trust application access that secures remote access to internal resources.
Workloads and human users interact with Akeyless using various channels, including the Akeyless Web Console, the Akeyless Remote Access Portal, CLI, API, SDKs, and an extensive range of plugins and integrations. A wide range of authentication methods is used together with role-based access control to ensure that clients are only granted access to specific secrets.
Using a patented, FIPS 140-2-certified technology called Akeyless Distributed Fragments Cryptography, the Akeyless Vault Platform provides a highly secure SaaS solution with zero-knowledge capabilities so that even Akeyless cannot access users’ encryption keys or decrypt their secrets.
Silverfort delivers secure authentication and zero-trust policies across corporate networks and cloud environments without deploying any software agents or inline proxies. Using patent-pending technology, Silverfort enables risk-based multi-factor authentication for all sensitive users, devices, and resources, including systems that could not be protected until today, such as homegrown applications, IT infrastructure, file systems, and machine-to-machine access.
Silverfort allows organizations to prevent data breaches and achieve compliance instantly by preventing identity-based attacks across complex, dynamic networks and cloud environments.
The company was a winner of Frost & Sullivan’s New Product Innovation Award for 2017 and was named one of the “Cool Vendors in Identity and Access Management, 2019” by the Gartner Research Group
Axis Security enables organizations to quickly deliver tightly managed global access to employees, partners, and other stakeholders through a purpose-built zero-trust cloud-security platform. Axis Security’s advanced application isolation technology ensures access to only the necessary resources.
For further information contact the Economic and Trade Department at the Israeli Consulate in Mumbai.
Siddhant Gupte; Trade Officer, Mumbai
Leave A Comment