SDP101 Overview Presentation W Talktrack 022421-210316-174943
SDP101 Overview Presentation W Talktrack 022421-210316-174943
SDP101 Overview Presentation W Talktrack 022421-210316-174943
2
A Better Way: Appgate SDP,
a Zero Trust Solution
3
Appgate SDP
Software-Defined Perimeter
Operating System
Location
Time of Day
Network
Device Posture
External Systems
4
Identity Centric
5
Live Entitlements
6
Live Entitlements
7
Live Entitlements
8
Live Entitlements
9
Segment of One
• Secure encrypted
communication
• Connects user to only
authorized resources
• Eliminates problem of
lateral movement
• Access adjusted in real
time as necessary
• Support for hybrid IT with
multi-tunnel capability
10
Use Cases
11
How Appgate SDP Works
APPLICATION
GATEWAY
APPLICATION
Cloud Scale and Resilience
ON PREM
CONTROLLER
APPLICATION
RESOURCE
GATEWAY
14
Programmable
and Adaptable
LDAP
15
Enterprise Grade.
Cloud Scale.
ADVANCED
TECHNOLOGY
PARTNER
SECURITY
COMPETENCY
16
Platform of Choice for
the Public Sector
CONTINUOUS COMMON
DIAGNOSIS AND CRITERIA
MI T I G ATI O N CERTIFIED
PROGRAM
APPROVED O N LY S D P
PRODUCT OFFERING
17
“Easy implementation, innovative features, incredible
support and guidance”
IDENTITY AND ACCESS SERVICE MANAGER IN
T HE S E RV I C E S I N D U S T RY BROADEST
F E ATU R E S E T
SOFTWARE-
DEFINED
“Ability to customize the product is amazing. PERIMETER
18
“Any enterprise seeking a simple
but effective way to eliminate the
threats present for enterprises
LEADER
using hybrid infrastructure should
explore Appgate’s offerings. ”
ZERO-TRUST
EXTENDED
ECOSYSTEMS
19
Appgate SDP:
The Zero Trust Solution
20
Next Steps
21
Remote & Third-Party Access
ENTERPRISE
Benefits
• Grants access based on identity with business and risk
awareness
• Secure encrypted 1:1 connection between user and PROTECTED
ASSETS
approved system only
• Unauthorized resources are completely invisible
• Eliminates lateral movement on internal networks
22
Cloud Migration
Problem
• Datacenter migration requires months of planning Seamless
and testing connection
• Difficult to stage migration to minimize downtime between data
• Migration involves coordination between compute, center and cloud
network, and SecOps
Benefits
• Simplify planning and execution of staged migration
• Reduce downtime with dynamic entitlements
• Unified policy framework across all clouds
• Eliminate cloud vendor lock-in
23
Speed up security.
Unleash DevOps DEV TEAM 1
Benefits
• Simultaneous access
• Location agnostic Access STAGING
• Entitlements by attributes (AWS tags) NEW YORK
Implications
• Precise, fine-grained access control
• Transparent user experience
• User access dynamically adjust based on server tags REMOTE PRODUCTION
24
Eliminate VPNs
Virtual workers and third-party contractors need
access to your critical systems from anywhere
ENTERPRISE
on any device. But VPNs treat all users the
same: an IP address allowed to connect to your
network—or not.
Problem EMPLOYEES
ZERO TRUST
NETWORK 2
• Granting access to only specific resources required
• Removing access immediately upon completion
of work
• Lack visibility into audit details for compliance
• Limit exposure to internal attack surface if vendor
is compromised
CONTRACTORS ZERO TRUST
NETWORK 1
Benefits
• Grants access based on identity with business and
risk awareness
• Secure encrypted 1:1 connection between user and
approved system only PROTECTED
ASSETS
• Unauthorized resources are completely invisible
• Eliminates lateral movement on internal networks
25