SlideShare a Scribd company logo
1 of 21
Software Defined Perimeter
info@perimeter81.com
www.perimeter81.com
Transforming Secure Network Access
for the Modern and Distributed Workforce
Meet Matt
➔ IT Manager at a US technology company
with 370 employees.
➔ His organization has sales and engineering
business units, each requiring different network access.
➔ While their engineering team requires AWS and on-premise app
access, their sales team needs reliable, secure domain services
and cloud based CRM access.
The Challenge: Securing Cloud Resources Access
Before choosing Perimeter 81, our client faced limited options:
Leave their applications open to the Internet
Implement basic firewalling
Create an in-office VPN concentrator
Build their own VPN gateways
Pursue a traditional corporate VPN service
His Business Pains
Complicated VPN setups and outages
Tedious hardware updates and maintenance
Company-specific configurations and passwords
Integrating physical servers and site-specific applications
with cloud based infrastructure and applications.
The Way We Work Has Changed
(IDC, June 2015)
We are mobile
“By 2020, mobile workers will make up
nearly 75% of the US workforce.”
The Rapid Growth of Cloud Computing, 2015-2020
(IDC, September 2016)
We use the cloud
Worldwide Spending on Public Cloud Computing ($B)
We connect to public Wi-Fi
“By 2020, the number of public Wi-Fi hotspots is projected
to reach 432 million -- 7X the 2015 figure of 64 million.”
(Cisco, February 2016)
Every Company Needs VPN Technology
For small
businesses with
10 employees
To major
enterprises with
over 500,000
It’s the bread and butter for accessing resources.
But the Traditional VPN Has Not Kept Up...
Hardware-based
Very expensive
Difficult to install and
manage
Slow connection speeds
Hard to scale
Not cloud-friendly
The Legacy User
Experience.
Not-so-friendly client
applications
The Legacy
Architecture.
Lacks centralized cloud
management
For So Many It Is Not Accessible Nor… Relevant
Enter the Software-Defined Perimeter
“By 2021, 60% of enterprises will have replaced VPNs with SDP
solutions”
(Gartner, September 2016)
The Software-Defined Difference
➔ Software Defined
➔ Cost-effective
➔ Easy to set up and manage
➔ Immediate updates & upgrades
➔ Highly scalable
➔ Seamless cloud integration
We’re doing what Dropbox did
for files with network access
Dropbox: Moving from a physical network file
system to cloud-managed file sharing service.
Perimeter 81: Moving from physical VPN
gateways to a cloud-managed network access
service.
Perimeter 81 - Unified, Simplified Architecture
The Gateway
The ClientThe Controller
Automatic Wi-Fi Security
Immediate Wi-Fi
Security
Automatic
Activation
Complete Data Protection
(and Network Lock)
USPTO patent pending, Serial No, 15/415,991 under the title:
AUTOMATIC ESTABLISHMENT OF A VPN CONNECTION OVER UNSECURED
WIRELESS CONNECTION
A Seamless User Experience
Instant Gateway Deployment Unified Cloud Management Single-Click Applications
Multi-Tenant Consolidated Management
➔ SSO, SAML, AD integration
➔ Full auditing & monitoring
➔ Fast gateway deployment
➔ Easy network segmentation
➔ Anomaly detection
➔ Web and mobile support
Remember Matt?
➔ Seamlessly deploy fully managed custom SDP gateways into the
organization’s cloud or on-premise networks.
➔ Connect to their Identity Provider (Okta) to gain user and group
policy control.
➔ Easily provision micro-segmented network access per application
and/or network segment.
He now has the ability to:
Remember Matt?
With our innovative cloud SDP, our client can now promote employee
productivity, with a solution that’s not only customizable, easy-to-use
and employee friendly, but also highly reliable and secure!
Thank You!
Contact: sales@perimeter81.com
Request a Demo: https://app.perimeter81.com/request-demo

More Related Content

What's hot

SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age TechnologyPrankit Mishra
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationSai P Mishra
 

What's hot (20)

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
screen-less displays
screen-less displays screen-less displays
screen-less displays
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
A Software Defined WAN Architecture
A Software Defined WAN ArchitectureA Software Defined WAN Architecture
A Software Defined WAN Architecture
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Fog computing : The new age Technology
Fog computing : The new age TechnologyFog computing : The new age Technology
Fog computing : The new age Technology
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 

Similar to The Software-Defined Perimeter: Securing Network Access for the Modern Workforce

Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPTAmazon Web Services
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Private Cloud
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topologyIRSHAD RATHER
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge MarketQOS Networks
 
VMware Cloud on AWS Cloud Migration Deep Dive
 VMware Cloud on AWS Cloud Migration Deep Dive VMware Cloud on AWS Cloud Migration Deep Dive
VMware Cloud on AWS Cloud Migration Deep DiveAmazon Web Services
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...actualtechmedia
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvisdickcraigson
 
The-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdfThe-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdfNetCom Learning
 
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdfData & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdfChris Bingham
 

Similar to The Software-Defined Perimeter: Securing Network Access for the Modern Workforce (20)

Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topology
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market
 
VMware Cloud on AWS Cloud Migration Deep Dive
 VMware Cloud on AWS Cloud Migration Deep Dive VMware Cloud on AWS Cloud Migration Deep Dive
VMware Cloud on AWS Cloud Migration Deep Dive
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
 
Datadog brief
Datadog briefDatadog brief
Datadog brief
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvis
 
The-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdfThe-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdf
 
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdfData & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
 

Recently uploaded

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2
 

Recently uploaded (20)

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration Tooling
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 

The Software-Defined Perimeter: Securing Network Access for the Modern Workforce

  • 1. Software Defined Perimeter info@perimeter81.com www.perimeter81.com Transforming Secure Network Access for the Modern and Distributed Workforce
  • 2. Meet Matt ➔ IT Manager at a US technology company with 370 employees. ➔ His organization has sales and engineering business units, each requiring different network access. ➔ While their engineering team requires AWS and on-premise app access, their sales team needs reliable, secure domain services and cloud based CRM access.
  • 3. The Challenge: Securing Cloud Resources Access Before choosing Perimeter 81, our client faced limited options: Leave their applications open to the Internet Implement basic firewalling Create an in-office VPN concentrator Build their own VPN gateways Pursue a traditional corporate VPN service
  • 4. His Business Pains Complicated VPN setups and outages Tedious hardware updates and maintenance Company-specific configurations and passwords Integrating physical servers and site-specific applications with cloud based infrastructure and applications.
  • 5. The Way We Work Has Changed
  • 6. (IDC, June 2015) We are mobile “By 2020, mobile workers will make up nearly 75% of the US workforce.”
  • 7. The Rapid Growth of Cloud Computing, 2015-2020 (IDC, September 2016) We use the cloud Worldwide Spending on Public Cloud Computing ($B)
  • 8. We connect to public Wi-Fi “By 2020, the number of public Wi-Fi hotspots is projected to reach 432 million -- 7X the 2015 figure of 64 million.” (Cisco, February 2016)
  • 9. Every Company Needs VPN Technology For small businesses with 10 employees To major enterprises with over 500,000 It’s the bread and butter for accessing resources.
  • 10. But the Traditional VPN Has Not Kept Up... Hardware-based Very expensive Difficult to install and manage Slow connection speeds Hard to scale Not cloud-friendly The Legacy User Experience. Not-so-friendly client applications The Legacy Architecture. Lacks centralized cloud management
  • 11. For So Many It Is Not Accessible Nor… Relevant
  • 12. Enter the Software-Defined Perimeter “By 2021, 60% of enterprises will have replaced VPNs with SDP solutions” (Gartner, September 2016)
  • 13. The Software-Defined Difference ➔ Software Defined ➔ Cost-effective ➔ Easy to set up and manage ➔ Immediate updates & upgrades ➔ Highly scalable ➔ Seamless cloud integration
  • 14. We’re doing what Dropbox did for files with network access Dropbox: Moving from a physical network file system to cloud-managed file sharing service. Perimeter 81: Moving from physical VPN gateways to a cloud-managed network access service.
  • 15. Perimeter 81 - Unified, Simplified Architecture The Gateway The ClientThe Controller
  • 16. Automatic Wi-Fi Security Immediate Wi-Fi Security Automatic Activation Complete Data Protection (and Network Lock) USPTO patent pending, Serial No, 15/415,991 under the title: AUTOMATIC ESTABLISHMENT OF A VPN CONNECTION OVER UNSECURED WIRELESS CONNECTION
  • 17. A Seamless User Experience Instant Gateway Deployment Unified Cloud Management Single-Click Applications
  • 18. Multi-Tenant Consolidated Management ➔ SSO, SAML, AD integration ➔ Full auditing & monitoring ➔ Fast gateway deployment ➔ Easy network segmentation ➔ Anomaly detection ➔ Web and mobile support
  • 19. Remember Matt? ➔ Seamlessly deploy fully managed custom SDP gateways into the organization’s cloud or on-premise networks. ➔ Connect to their Identity Provider (Okta) to gain user and group policy control. ➔ Easily provision micro-segmented network access per application and/or network segment. He now has the ability to:
  • 20. Remember Matt? With our innovative cloud SDP, our client can now promote employee productivity, with a solution that’s not only customizable, easy-to-use and employee friendly, but also highly reliable and secure!
  • 21. Thank You! Contact: sales@perimeter81.com Request a Demo: https://app.perimeter81.com/request-demo

Editor's Notes

  1. The many different remote access solutions his customers have in place
  2. The many different remote access solutions his customers have in place
  3. “Only 14 percent of SMBs rate their ability to mitigate cyber attacks as highly effective. The top reasons for this include insufficient personnel (67 percent), insufficient budget (54 percent) and insufficient enabling technologies.” Ponemon Institute, July 2016
  4. Mשrkets And Markets a CAGR of 34% over the next 5 years Connectivity complexity has made the old security compromises unsustainable, driving the need for a newer approach that meets the digital business needs for complexity, traffic volume and flexibility while avoiding the inherent vulnerabilities of the old models.” “IT and security leaders understand that responsibility for cloud Infrastructure-as-a-Service (IaaS) Security is shared between enterprises and cloud providers, and that IaaS has different user access and security requirements than traditional on-premises systems. However, these requirements cannot be fully satisfied with traditional security tools and the security constructs provided by the IaaS vendor.” The SDP Working Group, 2017
  5. Single point of management across environments and branches Free of hardware Easy to deploy Connection to identity providers : Google Suite, Okta, SAML, Active Directory Micro segment access to different environments Audit and monitoring logs, User & Device Transparency (MSSP capabilities)
  6. Secure access to remote resources in the cloud & on premise Cloud management platform for single point of management & monitoring. Segmented Virtual Private Network in the cloud
  7. Only 1 in 3 people can tell the difference between secure and unsecure Wi-Fi networks. automatic Wi-Fi protection- key differentiators Our breakthrough feature provides automatic encryption on untrusted Wi-Fi networks, no matter where the employee is, even if their device is locked and in their pocket.
  8. Easy-to-use, Easy-to-manage cost-effective software-defined solution.