www.safe-t.com Keeping Data in the Right Hands If You Can’t Be Seen, You Can’t Be Hacked TM Safe-T’s Software Defined Access solution provides authorized access to applications, safe sharing of information within your organization’s hybrid cloud environment, deep insight into user behavior to detect bots and malicious insiders, and helps you comply with industry regulations and standards. Software-Defined Access Safe-T’s Software-Defined Access masks data at the network perimeter, hiding applications and services from hostile and unauthorized entities – both externally and internally. Sensitive data, applications, services and networks simply remain invisible unless access is properly granted. Software Defined Access Unify & Streamline Your Data Access Safe-T protects your entire data access life cycle. After authenticating and verifying the user and device, Safe-T’s patented Reverse Access technology pushes out the requested data only to the authorized user. With security policy-based access control, Safe-T lets you control data usage, detect risk and create audits and reports. With a seamless user experience from any device, Safe-T also facilitates and consolidates data trust assessments for on-premise and hybrid cloud deployments, securing access to data and applications everywhere. Organization LAN DMZ Anti-Malware Segment Business App File/Data Storage Email DLP Internal Employee IAM Anti-Malware Finance App RDP SFTP Web Portal Remote Worker Customer Contractor, 3rd Party Vendor, Partner Cloud Storage Internet Safe-T Software Defined Access Solution Data is the Life Blood of Your Business

Software Defined Access - Safe-T Data · Gain unified control and management of your data while maintaining business continuity. Facilitate and consolidate hybrid cloud deployments

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Software Defined Access - Safe-T Data · Gain unified control and management of your data while maintaining business continuity. Facilitate and consolidate hybrid cloud deployments

www.safe-t.com Keeping Data in the Right Hands

If You Can’t Be Seen, You Can’t Be HackedTM

Safe-T’s Software Defined Access solution provides authorized access

to applications, safe sharing of information within your organization’s

hybrid cloud environment, deep insight into user behavior to detect bots

and malicious insiders, and helps you comply with industry regulations

and standards.

Software-Defined AccessSafe-T’s Software-Defined Access masks data at the network perimeter,

hiding applications and services from hostile and unauthorized entities –

both externally and internally.

Sensitive data, applications, services and networks simply remain

invisible unless access is properly granted.

Software Defined Access

Unify & Streamline Your Data AccessSafe-T protects your entire data access life cycle. After authenticating and verifying the user and device, Safe-T’s

patented Reverse Access technology pushes out the requested data only to the authorized user. With security

policy-based access control, Safe-T lets you control data usage, detect risk and create audits and reports. With

a seamless user experience from any device, Safe-T also facilitates and consolidates data trust assessments for

on-premise and hybrid cloud deployments, securing access to data and applications everywhere.

Organization

LANDMZ Anti-Malware Segment

BusinessApp

File/DataStorage

Email

DLPInternal

EmployeeIAM

Anti-Malware

FinanceApp

RDPSFTPWeb PortalRemote Worker

Customer Contractor, 3rd Party Vendor,

Partner

CloudStorage

Internet

Safe-T SoftwareDefined Access Solution

Data is the Life Blood of Your Business

Page 2: Software Defined Access - Safe-T Data · Gain unified control and management of your data while maintaining business continuity. Facilitate and consolidate hybrid cloud deployments

Data Access Lifecycle

Step 1 Adaptive Access to Services and Data

Safe-T’s ‘on-demand Software Defined Perimeter’ transparently grants access only to authorized users by separating the access layer from the authentication layer, and by segregating internal networks. It authenticates the user and verify its device using fingerprinting, prior to providing access.

Step 2 Control Usage of Data

Once users have access to your applications and data, Safe-T ensures they only use the data according to their respective usage and access policies. The data residing inside your organization or being transferred in and out of the organization is completely controlled and protected from the inside out of the network – on premise or in the cloud.

Step 3 Report on Data Usage

Throughout the application access lifecycle, Safe-T monitors and audits all user actions for each access application or data repository. Granular real-time dashboards, historical reports and analysis on data usage and risks, ensures compliance to regulations and shortest time to breach discovery and remediation. Additionally, our Telepath Behavior Analysis tool detects the presence of bots and malicious insiders and provides actionable reports to prevent damage before it occurs.

Figure 2 - Safe-T Secure Data Access Technologywww.safe-t.com

The Data Access Lifecycle

By making your data invisible to the outside world, and by controlling the data access lifecycle we protect you from cyber-attacks.

Authenticate User

Verify User

On-demand access using Reverse-Access

Manage allowed usage methods

Policy based access control

Detect risk

Auditing per user and per applicationHistorical reports and analysis on data usageActionable risk reporting

ADAPTIVE ACCESS to Services and Data

1

3

2

Data Usage AUDITS AND REPORTS

Data Usage CONTROL

Page 3: Software Defined Access - Safe-T Data · Gain unified control and management of your data while maintaining business continuity. Facilitate and consolidate hybrid cloud deployments

Software-Defined Access Benefits

Hide applications and services from external or internal unauthorized entities.

Detect and prevent bots and malicious insiders with behavior analysis.

Gain unified control and management of your data while maintaining business continuity.

Facilitate and consolidate hybrid cloud deployments.

Provide a transparent and clientless user experience.

See evident ROI from both an operational and capital expenditure cost savings perspective.

Ensure adherence to constantly evolving regulations and compliance.

Comply with and support existing and future digital data requirements.

Keeping Data in the Right Hands

The Software-Defined Access Solution Use Cases

Provide secure, controlled and transparent access and usage for all entities to internal applications and files

Control access and secure the exchange of any type and size of file between people, applications, cloud solutions, and businesses

Easily and securely offer new file upload services for applications, customers and anonymous users

Control and monitor all data uploaded and downloaded from the enterprise to/from cloud storages

Provide native user access to encrypted company file storages, while providing full access control on file permissions, types and sizes, ensuring separation of duties between business units.

Simplify migration to hybrid-cloud architectures by securelyand transparently connecting the cloud to the on-premise

Secure Hybrid Cloud Access

Cloud StorageAccess

AutomatedApplicationAccess

SecureInternal File Access

SecureFile & EmailAccess

Secure ApplicationAccess

Page 4: Software Defined Access - Safe-T Data · Gain unified control and management of your data while maintaining business continuity. Facilitate and consolidate hybrid cloud deployments

www.safe-t.comwww.safe-t.com Keeping Data in the Right Hands

© 2018 Safe-T Data Ltd. All Rights Reserved. Safe-T and all other Safe-T product and service names are registered trademarks of Safe-T Data in

the U.S. and other countries. All other trademarks and names are the property of their respective owners.

About Safe-T

Safe-T® Data A.R Ltd., a wholly-owned subsidiary of Safe-T Group Ltd. (Nasdaq, TASE: SFET), is

a provider of software-defined access and zero trust access solutions which mitigate attacks

on enterprises’ business-critical services and sensitive data. Safe-T solves the data access

challenge. The company’s software-defined access (SDA) platform reduces the attack surface,

empowering enterprises to safely migrate to the cloud and enable digital transformation.

With Safe-T’s patented, multi-layer software-defined access, financial services, healthcare,

utility companies and governments can secure data, services, and networks from internal and

external threats.

For more information, visit www.safe-t.com

BR-2-18