SAIFE

A revolutionary product that allows you to secure your ever changing and porous perimeter

The enterprise security perimeter concept is no longer valid. Perimeter is now extended to wherever your intended users are and to all the internet connected devices they use, due to Cloud migration, BYOD and third-party access. Your traditional perimeter centric defenses aren’t protecting the perimeter that is more porous than ever.

A Model for Today’s Agile Perimeter

With a Software defined perimeter approach, SAIFE created a zero trust model that defines access by the user, their identity and location. Access is established to only those data or applications that they are entitled to access, enforcing agile perimeters in real-time. A secured path is built from user to application and device to service. Secure tunnels through the Internet are created by SAIFE’s dynamic perimeter overlay (DPO) network, in which the privacy and integrity of all traffic is assured inside a micro-perimeter. Trusted routing is assured for any endpoint, across any network, regardless of infrastructure. It also eliminates the requirements of mandatory hardware that traditional approaches require.

Benefits

null

Reduced Attack Surface

SAIFE hides the endpoints behind all-inbound-filtering firewalls; making them invisible on the internet, never addressing one another, only receiving already-authenticated dynamic perimeter overlay traffic.
null

On-Demand Collaboration

SAIFE enables secure computing enclaves of disparate network connected participants to be created, modified, and dismantled easily and instantly using a point-and-click dashboard.
null

Fully Automated Key and Certificate Management

SAIFE supports centralized key management that automatically generates, shares and destroys keys and certificates. And endpoints can be provisioned securely from inside your LAN or from across the internet.
null

Easy to use and Implement

Simple, easy-to-use, point-and-click dashboards with automated and centralized key management for rapid provisioning of users and managing their communities of interest.
null

Significantly improve Security

SAIFE lowers the chances of successful network-based attacks such as denial-of-service attacks, man-in-the-middle attacks, server vulnerabilities and lateral movement.
null

Scalable, Distributed & Dynamic

Provision access to services both in the cloud and on premise from inside your network or from across the Internet to enable a flexible perimeter that automatically wraps around your changing assets.
null

Integrated with Identity Management

Authenticates users against multiple identity management systems, including Active Directory, SAML, and third-party identity and access management systems to automate provisioning.
null

Flexible Deployment Options

SAIFE’s flexible deployment model suits any architecture. Deploy SAIFE in public or private clouds, on premise, or via our secure SaaS-based multi-tenant environment.

Whitepaper

Solving Security for Today’s Agile Perimeter: A Software Defined Perimeter Approach

A New Paradigm for Securing Today’s Porous Perimeter