ZTCAP,
Zero Trust Conditional Adaptive Policy
Update applications and security with zero-trust security to replace existing VPNs
Enable zero-truth security for all users accessing the on-premises cloud, on-premises network, and SaaS environments.
A platform that connects faster and more securely than VPNs and protects users and endpoints is fully integrated. Ask for a demo.
Users can easily access authorized corporate system menus and resources, and access is restricted from unnecessary resources.
Implement consistent user-conditional access policies for all Web content and applications, regardless of cloud, hybrid or on-premise.
Replace existing VPNs with SHIELDGate and experience seamless remote access with zero trust security provided to users.
Execute conditional access policies
-
To set the minimum permissions of Zero Trust Conditional Access requirements, users grant access/permission based on various conditions for the environment of the Connection Client.
-
Apply policies such as blocking access, screen watermarking, downloading and print blocking according to basic conditions such as user (ID), connection location (IP), connection time, and connection target system (App).
Stronger ID Management According to SOFTCAMP ZTCA
-
Enhance login management by conditional policies.
-
If an ID leak is suspected, issue a disposable PIN for temporary access.
-
When user behavior monitoring detects anomalies, block login and send notification to administrators.
Clientless Solutions
-
Use the web application without client installation or user configuration.
-
Access with MS Edge or Google Chrome browser regardless of version without installing the application.
-
The client environment you connect to does not store any information.
*CDR, Contents Disarm&Reconstruction
Web Application Security
-
SHIELDGate protects web applications in SaaS, cloud, and on-premise environments through identity providers such as Microsoft and Google.
-
Apply consistent user conditional access policies in web-based applications with strong zero-trust rules.
Visibility into user behavior
-
Administrator can view all user behavior logs (login, logout, resource usage, etc.).
-
User behavior logs viewer or save cloud storage in SHIELDGate.
Past approach
Use internal networks based on basic trust
In the traditional boundary security model, protection targets are placed behind on-premise hardware, and traffic is protected by users using remote access equipment(VPNs).
Because VPNs trust all users who have passed authentication, once an attacker succeeds in authentication, they can break in and damage the corporate. In addition, because VPNs use clients, traffic backfiring reduces performance, which inevitably affects user productivity.
As enterprise-targeted attacks are becoming more sophisticated and hybrid practices are becoming more common, data within enterprises is moving to cloud storage, increasing the risk to traditional security practices.
modern approach
ZTNA(Zero Trust Network Access)
Users connect to on-premises systems through clients or web browsers instead of VPNs.These connections are evaluated based on zero trust security, which determines the combination of ID providers, devices, and other access elements.
In the traditional way that VPNs were needed to connect clients installed for on-premises systems to the on-premises network, SHIELDGate's servers allow all traffic to be routed privately for connection and verification and optimal performance and security policies.
Softcamp’s ZTCA and SSE
Zero Trust application access is an important component of the Security Service Edge (SSE) network security model.
Find out how Softcamp ZTCA fits to SSE solutions at Softcamp, security and connection switching at SHIELDGate.