With the rise of cloud computing, Wi-Fi hotspots and the mobile workforce, the way we work has fundamentally changed. The complex, hardware-based and distributed legacy VPN technology of the past, is no longer relevant for today. Luckily, the emergence of cloud-based VPN and software-defined perimeter technology offers businesses the ability to protect critical company resources—based on-premise and in the cloud—in a simple and seamless way.
2. Meet Matt
➔ IT Manager at a US technology company
with 370 employees.
➔ His organization has sales and engineering
business units, each requiring different network access.
➔ While their engineering team requires AWS and on-premise app
access, their sales team needs reliable, secure domain services
and cloud based CRM access.
3. The Challenge: Securing Cloud Resources Access
Before choosing Perimeter 81, our client faced limited options:
Leave their applications open to the Internet
Implement basic firewalling
Create an in-office VPN concentrator
Build their own VPN gateways
Pursue a traditional corporate VPN service
4. His Business Pains
Complicated VPN setups and outages
Tedious hardware updates and maintenance
Company-specific configurations and passwords
Integrating physical servers and site-specific applications
with cloud based infrastructure and applications.
6. (IDC, June 2015)
We are mobile
“By 2020, mobile workers will make up
nearly 75% of the US workforce.”
7. The Rapid Growth of Cloud Computing, 2015-2020
(IDC, September 2016)
We use the cloud
Worldwide Spending on Public Cloud Computing ($B)
8. We connect to public Wi-Fi
“By 2020, the number of public Wi-Fi hotspots is projected
to reach 432 million -- 7X the 2015 figure of 64 million.”
(Cisco, February 2016)
9. Every Company Needs VPN Technology
For small
businesses with
10 employees
To major
enterprises with
over 500,000
It’s the bread and butter for accessing resources.
10. But the Traditional VPN Has Not Kept Up...
Hardware-based
Very expensive
Difficult to install and
manage
Slow connection speeds
Hard to scale
Not cloud-friendly
The Legacy User
Experience.
Not-so-friendly client
applications
The Legacy
Architecture.
Lacks centralized cloud
management
11. For So Many It Is Not Accessible Nor… Relevant
12. Enter the Software-Defined Perimeter
“By 2021, 60% of enterprises will have replaced VPNs with SDP
solutions”
(Gartner, September 2016)
13. The Software-Defined Difference
➔ Software Defined
➔ Cost-effective
➔ Easy to set up and manage
➔ Immediate updates & upgrades
➔ Highly scalable
➔ Seamless cloud integration
14. We’re doing what Dropbox did
for files with network access
Dropbox: Moving from a physical network file
system to cloud-managed file sharing service.
Perimeter 81: Moving from physical VPN
gateways to a cloud-managed network access
service.
15. Perimeter 81 - Unified, Simplified Architecture
The Gateway
The ClientThe Controller
16. Automatic Wi-Fi Security
Immediate Wi-Fi
Security
Automatic
Activation
Complete Data Protection
(and Network Lock)
USPTO patent pending, Serial No, 15/415,991 under the title:
AUTOMATIC ESTABLISHMENT OF A VPN CONNECTION OVER UNSECURED
WIRELESS CONNECTION
17. A Seamless User Experience
Instant Gateway Deployment Unified Cloud Management Single-Click Applications
18. Multi-Tenant Consolidated Management
➔ SSO, SAML, AD integration
➔ Full auditing & monitoring
➔ Fast gateway deployment
➔ Easy network segmentation
➔ Anomaly detection
➔ Web and mobile support
19. Remember Matt?
➔ Seamlessly deploy fully managed custom SDP gateways into the
organization’s cloud or on-premise networks.
➔ Connect to their Identity Provider (Okta) to gain user and group
policy control.
➔ Easily provision micro-segmented network access per application
and/or network segment.
He now has the ability to:
20. Remember Matt?
With our innovative cloud SDP, our client can now promote employee
productivity, with a solution that’s not only customizable, easy-to-use
and employee friendly, but also highly reliable and secure!
The many different remote access solutions his customers have in place
The many different remote access solutions his customers have in place
“Only 14 percent of SMBs rate their ability to mitigate cyber attacks as highly effective. The top reasons for this include insufficient personnel (67 percent), insufficient budget (54 percent) and insufficient enabling technologies.”
Ponemon Institute, July 2016
Mשrkets And Markets a CAGR of 34% over the next 5 years
Connectivity complexity has made the old security compromises unsustainable, driving the need for a newer approach that meets the digital business needs for complexity, traffic volume and flexibility while avoiding the inherent vulnerabilities of the old models.”
“IT and security leaders understand that responsibility for cloud Infrastructure-as-a-Service (IaaS) Security is shared between enterprises and cloud providers, and that IaaS has different user access and security requirements than traditional on-premises systems. However, these requirements cannot be fully satisfied with traditional security tools and the security constructs provided by the IaaS vendor.” The SDP Working Group, 2017
Single point of management across environments and branches
Free of hardware
Easy to deploy
Connection to identity providers : Google Suite, Okta, SAML, Active Directory
Micro segment access to different environments
Audit and monitoring logs, User & Device Transparency (MSSP capabilities)
Secure access to remote resources in the cloud & on premise
Cloud management platform for single point of management & monitoring.
Segmented Virtual Private Network in the cloud
Only 1 in 3 people can tell the difference between secure and unsecure Wi-Fi networks.
automatic Wi-Fi protection- key differentiators
Our breakthrough feature provides automatic encryption on untrusted Wi-Fi networks, no matter where the employee is, even if their device is locked and in their pocket.