Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
4 views

Safous Explainer Simple and Secure Zero Trust Access

Uploaded by

tangpv.tbi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Safous Explainer Simple and Secure Zero Trust Access

Uploaded by

tangpv.tbi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Simple and Secure

Zero Trust Access

Guiding Principles
One-Time Passwords
Ensure single-transaction
authentication – every time.

Least Privileged Access


Ensure controlled access
to business resources.

Minimized Attack Surface


All users are verified and validated.

Always-On Diagnostics
Catch threats before they become breaches.

Never Trust, A Quick Start Beyond Perimeter


Always Verify to Your Journey Defense
Eliminate implicit trust and ensure The Safous onboarding process is Traditional perimeter-oriented
security policies are fulfilled across simple and straightforward. ZNTA defense architectures are no
critical business activities. can be deployed to any network longer viable in modern hybrid
topology without budget and remote work environments.
adjustments or complex ZNTA minimizes the attack surface.
configuration changes.

www.safous.com
Scan to
find more

info@safous.com
Safous ZTA ZTA Control Functions

Service Overview
Authentication Lopping & Audit

MFA SSO Activity Audit

Risk based authorization Session Recording

Application Control

HTTP / HTTPS RDP / VNC Supervising

File Sharing SSH / Telnet

Global Safous POPs


Browser HTTPS Bussiness
REST API HTTPS Apps

TLS Tunnel

SaaS
Apps
Auto select Firewall
App
Nearest POP
IoT Gateway

LDAP / MS AD Cloud Apps


Virtual
Isolated Customer site
Browser 3rd Party IDaaS (Office, Data Center, Cloud)
3rd Party IDaaS

Securely High-Level Support for a Stay Fully Managed


Publish Applications Auth & Control Variety of Devices Compliant Service
Publish business Attach MFA & SSO Agentless Safous allows you to We provide 24/7
applications without to your business architectures choose your data remote monitoring
opening a firewall applications and support various web storage location, – so you stay
port. Block all ingress connect to your IdPs applications, RDP, ensuring you stay ahead of all
traffic while minimizing for app-based SSH, and more. compliant with data potential threats.
the attack surface. access control. security regulations
for your industry.

Service App Gateway


Specifications Requirements
Feature Specification Function Specification
Access Protocol HTTPS Support OS Ubuntu 20.04 / 22.04,
RHEL 8
Agentless Web browser-based: HTTP / HTTPS / RDP / VNC (Server Base Environment)
Support SSH / TELNET / SMB
Application Native client-based: RDP / SSH Recording 4 cores + 1 core per
Session Support 30,000 users
Agent Support TCP (1-65535) / UDP (1-65535) /
Application IP network segment RAM Min 7GB
(6GB + 512KB per user)
Recording Web browser-based:
Session Support RDP / VNC / SSH / TELNET/ Native SSH Storage 150GB
*If the recording function is
Monitoring 24 hour remote operation monitoring enabled, additional disk is required.
This assumes data is 2MB/min/user.
for App Gateway
Service up / Service Down
Network 32Kbps per user
Bandwidth
Browser Isolation Control clipboard up/down,
File download/upload,
Audio connection

Alerting Send email to specific customer email address


(Service Down)

Operation 24 hour urgent troubleshooting by


Support ticket /phone / email (English and Japanese)
Setting & configuration support by email during
business hours for each region: 03:00-13:00 GMT

Device Agentless: Windows / Mac / Linux / Android /


Support iOS / loT (HTTP CALL)
Agent: Windows / Mac / Linux SF-ZTA-07

You might also like