The biggest cybersecurity event of the past 30 years is undoubtedly the backdoor pest left to the Solarwinds Orion software. After all, more than 18 thousand Solarwinds users were seriously affected by this incident.
It is certain that we now need different defense methods than traditional cybersecurity defense methods. In this context, the Zero Trust approach comes to our rescue!
Zero Trust is a security-centric model based on the idea that an organization should not have a default trust option for everything inside or outside the network boundaries (computer, user,...). Before access permission is granted, the identity of everything that tries to access and connect to the system must be verified from more than one source.
Basic assumptions in the Zero Trust approach;
There is always a hostile person on the Network
There are always external and internal threats on the network
The fact that the network is local is not enough to decide on trust in a network
Every device, user and network traffic is verified and authorized
Access policies should be dynamic and calculated from as many data sources as possible
As Rigosis, we partner with solutions in accordance with Zero Trust principles where institutions can effectively manage Cyber Security risks.
Appgate SDP
It is a secure access solution that includes many of the Zero Trust principles with its capabilities.
The Appgate SDP solution, which does not have security vulnerabilities hosted by VPN technologies, takes the cyber security maturity levels of the institutions to a very high point.
Main Features
Invisible Infrastructure: It makes your network invisible thanks to the SPA (Single Packet Autherization) protocol. In this way, especially DDoS neutralizes Bruteforce type attacks and significantly reduces the risks of organizations despite zero-day vulnerabilities.
Identity Focused: By verifying the identity and authorization of each user who accesses the resources of your organization according to more than one criteria (nesting multiple AND/OR conditions according to the characteristics of the device the user uses, according to the network to which the device is connected to, according to the location of the device,...), it gives access after verifying the access authority to that resource. It can be integrated into an MFA solution used by your institution, or you can use the ready-made MFA feature that comes within the solution if you wish.
Dynamic and Continuous Access Control: Appgate SDP in-house user instantly detects possible change in access permissions and automatically updates access rules according to the new situation.
Micro Networks: Appgate SDP allows each user to access resources only within the framework of their assigned access permissions. Users are prevented from accessing the corporate network or a different source other than these resources. In this way, micro segmentation is made on the basis of user permissions.
Rich API Content: It makes it very easy to work in in-house application integrations and hybrid cloud environments through the APIs it contains. For example, you can link the access authority to an externally accessible advisor to the approval in a request application; when the request is opened, the advisor can automatically access the relevant resource via Appgate SDP, and the access permission can be automatically removed when the request is closed.