Software Defined Perimeter

IF YOU CAN'T BE SEEN, YOU CAN'T BE HACKEDtm

A report by Gartner, called It’s Time to Isolate Your Services From the Internet Cesspool sheds light on the fact that current perimeter designs and how organizations expose their services (applications, APIs, etc) to the world are obsolete and create too much risk to organizations. It introduces a new concept called the Software Defined Perimeter (SDP) as a means to resolve this.

The fact is that organizations have been exposing their services (such as HTTP/S, RDP and APIs) to the world in the same way for years, and no matter how many layers of security are added, hackers have been able to get through or bring down the services using DDoS attacks.

It’s time to recalibrate the way organizations expose services. What if instead of statically exposing and publishing your services to the world and then layering security measures to prevent unauthorized access and prevent DDoS attacks, you exposed them on-demand and only for authenticated users. So essentially you hide your services from the Internet until it is absolutely necessary to allow someone to access the service.

INTRODUCING THE ON-DEMAND PERIMETER

Safe-T’s Software Defined Perimeter (SDP) architecture is the basis for Safe-T’s Secure Application Access solution. By deploying Safe-T’s Software Defined Perimeter architecture, organizations can now design and deploy the On-Demand Perimeter. The On-Demand perimeter creates access rules for authenticated users into applications and data, in a fully automated and dynamic fashion.

HOW THE ON-DEMAND PERIMETER WORKS

  • 1

    User logs into dedicated authentication portal published by the Authentication Gateway.

  • 2

    The user enters the credentials into the portal

  • 3

    The Access Controller retrieves the credentials from the Authentication Gateway over a reverse-access connection, and then authenticates the user using – 3rd party IAM/IDP solutions, POST based login, Microsoft Active Directory, SAML, OTP, etc.

  • 4

    Once the user is authenticated, the Access Controller instructs the Authentication Gateway which applications to display to the user, and instructs the Access Gateway to provide (reverse) access to the specific user to allowed applications

  • 5

    The user selects the application which should be accessed

  • 6

    The user is redirected to the application’s published IP address

  • 7

    The user accesses the newly published service

  • 8

    Once the user disconnects from the service, the Access Controller instructs the Access Gateway to block access to the specific user to the specific application

Safe-T Software Defined Perimeter

The Safe-T Software Defined Perimeter solution provides the ultimate cyber threat protection for published services, supporting protocols such as HTTP/S, RDH5, WebDAV, etc. Organizations can now provide a complete remote access suite for remote users and partners for internal services, including Web, RDP, NTFS, Email, and more. All without requiring the user to install any client software and without the need for VPN, while the entire time the services are completely hidden from the world.

SOFTWARE DEFINED PERIMETER CAPABILITIES

  • Firewall is constantly in a deny-all state, no open port (inbound or outbound) is required for access.
  • Supports a variety of applications – HTTP/S, SMTP, SFTP, SSH, APIs, RDH5, WebDAV.
  • Bi-directional traffic is handled on outbound connections from the LAN to the outside world.
  • Defines new reverse-access rules on-demand.
  • Allow client-less access to data, services, networks and APIs.
  • Robust partner authentication options.
  • Remove the need for VPN.
  • Perform SSL decryption in a secure zone.
  • Scan any incoming traffic using the organization’s security solutions.
  • Hide DMZ components which can be hacked and utilized to access the network.
  • Provide only direct application/service access, thereby blocking network access.

BENEFITS

  • Supports any type of application or service.
  • Bi-directional traffic over outbound connections.
  • Hides enterprise services from the Internet.
  • Only authenticated users access the service.
  • Prevents DDoS attacks on protected services.
  • Simple and easy application access.
  • Reduces client-server VPN overhead.
  • Blocks network access, allow application access.
  • Integrates all security and IAM solutions into data access flow.