SlideShare a Scribd company logo
Vertex Perspectives
Software defined perimeter platform
Meta Networks believes it’s time to update the
way we approach network access and security –
to leverage cloud and internet to build a global,
zero-trust private network that is agile and
scalable for the way business is done today.
Counter-Drone Solutions
for Urban Environments
Goodbye VPN,
Hello SDP
Company Snapshot
TEAM INVESTORS HIGHLIGHTS
Founders • Founded in 2016
• HQ: Tel Aviv, Israel
• Acquired by Proofpoint
• Partnerships with Cisco, AWS, Talari
Networks (Oracle) and Cyren
• Multiple recognitions including
• Finalist in the Red Herring 100
Europe and US
• Wins Gold in Cybersecurity
Excellence Awards
• Shortlisted for Business Continuity
Award
• Recognition in reports by Gartner
and 451
Etay Bogner, CEO
A serial entrepreneur, his previous
ventures include Stratoscale,
Neocleus (acquired by Intel) and
SofaWare (acquired by CheckPoint).
Shmulik Ladkani, CTO
A veteran network and security
architect, previously held
leadership positions at Jungo
(acquired by NDS/Cisco) Ravello
Systems (acquired by Oracle) .
Alon Horowitz, VP R&D
An expert in cloud and virtualization
technologies, previously lead
product development teams at
Stratoscale and IBM.
Acquired Meta Networks in 2019
Industry Challenges
VPNs are site centric but the way we work has changed dramatically
in the last decade
We used to sit in offices, using on-premise apps on private networks.
Now we’re working from everywhere and our applications are
migrating to the cloud.
Traditional VPNs typically –
• Trust-based network design
• Authentication at connection
• Gateways to internet
• Backhauling internet traffic
• Star/ mesh site-to-site connectivity
• Mediocre user experience
The perimeter is dissolving and security paradigms designed around
the idea that users on the LAN can be trusted is not designed to
meet the operational or security challenges that we face today.
Trust-based
●
Broad Access
●
Complex to manage
●
Poor UX
Solution Overview
Meta Network’s Software Defined Parameter (SDP) is user centric
and addresses fragmentation and complexity of the security
perimeter. It is re-architecting the perimeter for the cloud age with
features of –
• Zero trust: all access to applications in the data center and cloud
must be granted with whitelist
• Global network backbone: support millions of concurrent users
• Identity based access: each device and network entity is unique
• Always-on security: for any user, location or device
• Rapid, simple deployment: agent and client-less
• Superior user experience
Meta Network-as-a-Service (NaaS) is the future of enterprise
networking, abstracting the physical topology into a logical network
that enables policy-based management of users and applications.
Solution Overview
Video link: https://youtu.be/zLNQuBqNhT8
Case Studies
“With Meta NaaS, we are centrally managing a zero-trust network that
covers all of our applications and data, and our employees, contractors and
customers. We’re growing quickly and the solution is robust and flexible
enough to grow with us - it’s easy to onboard new customers and assure the
granular security that we need”
- Amir Mehler, Cross-Tec TL, Via Transportation Inc.
“Meta Networks essentially closed any security gaps we saw with our previous
setup. With the new system, each user is only exposed to the specific
applications he or she needs, regardless of which data center it’s located in.
Our Sales and Support teams have seen an increase in productivity because
they now connect once, and access everything they need. Compared to
managing VPNs in each of our data centers, the Meta NaaS solution is much
simpler and more convenient both for both our IT team and our users.”
- Moshe Magal, IT Team leaderCustomer Spotlight #1: Via
Use Case: Manage access to cloud infrastructure
Background: Via is building a ride sharing platform and licensing its technology
to companies building transit systems in other locations around the world. The
company is completely cloud native and has a widely distributed workforce with
more than 400 employees and contractors. In addition, their transportation
operator partners based in different locations required access to specific
portion of Via’s platform. This was challenging in terms of segmenting and
securing access as well as complex onboarding. Via’s vision was a zero-trust,
user centric network security architecture enforced consistently across all
groups of users regardless of their location.
Results:
• Enhanced security: network is protected by SDP per user that is
dynamically enforced, verified and logged
• Rapid customer onboarding: within minutes
• Efficient cloud network management: tasks such as spending time on
firewall configurations to microsegment networks are fully automated using
the Meta API and are an integrated part of DevOps
Customer Spotlight #1: My Heritage
Use Case: Convenient and secure access
Background: My Heritage is the leading global destination for discovering, preserving
and sharing family history with 93M users across 196 countries, 40M family trees
and 8.4B records. Employees often face delays due to slow and unreliable access to
multiple data centers through multiple VPN solutions while IT team face challenges
including security vulnerabilities and help desk overload
Results:
• One flat, logical network: Meta NaaS acts as central fabric through which all
network elements are consumed and managed
• Better user experience: one way to connect thus improving performance
compared to VPN over internet
• Enhanced security: Meta networks unified policies for easier management,
enabling defined access for each user group
Competitive Advantage
The most flexible and robust SDP solution available
• Zero-trust, granular “segment of 1” remote access: policy-
defined user/ device/ application access limits attack surface
• Cloud delivered network security: by leading vendors
• Flexible connectivity: only SDP solution with OTT SD-WAN
capabilities to connect clouds, data centers and users
• Continuous risk and trust assessment: based on patent-
pending identity based network
• No hardware: simple to deploy and manage
Meta Network is user-centric rather than site-centric, making it the
ideal solution for network security challenges that businesses face
today – from providing user-friendly remote access to connecting
cloud infrastructure and reducing management costs
Thanks for reading!
About Vertex Ventures
Vertex Ventures is a global network of operator-investors who manage portfolios
in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand
experience in transformational technologies, on-the-ground knowledge in the
world’s major innovation centers and global context, connections and customers.
Contributors
Disclaimer
This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and
industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable
and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings
is under no obligation to update the information or communicate that any updates have been made.
Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives.
Vertex Perspectives: Cybersecurity Series
• Cybersecurity | Risk. Impact. Innovations.
• Cybersecurity | Axonius: Asset Management Platform
• Cybersecurity | Cylus: Railway Cybersecurity
• Cybersecurity | Cymulate: Breach & Attack Simulation
• Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments
• Cybersecurity | Indegy: Industrial Cybersecurity
• Cybersecurity | Meta Networks: NaaS Software Defined Perimeter
• Cybersecurity | PerimeterX: Next Generation Bot Defense
• Cybersecurity | Very Good Security: SaaS Platform for Data Security

More Related Content

What's hot

The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
Syam Madanapalli
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
Real-Time Innovations (RTI)
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
360mnbsu
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
Zscaler
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
Darryl Santa
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
Marketing Team
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
DevOps.com
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
IoT613
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
George Fares
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
kidozen
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
Dell World
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
Real-Time Innovations (RTI)
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSKCSAIsrael
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
Marketing Team
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
ITpreneurs
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Bosnia Agile
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
Shawn Nutley
 

What's hot (20)

The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 

Similar to Cybersecurity | Meta Networks: Software defined perimeter platform

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
Advanced Technology Consulting (ATC)
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
LiveAction Next Generation Network Management Software
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
CloudWALL Italia
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
LolaHel
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
Jean Ryu
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
ATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - JagsATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - Jags
Advanced Technology Consulting (ATC)
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Zeeve
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
미래웹기술연구소 (MIRAE WEB)
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 

Similar to Cybersecurity | Meta Networks: Software defined perimeter platform (20)

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
ATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - JagsATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - Jags
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 

More from Vertex Holdings

Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?
Vertex Holdings
 
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)
Vertex Holdings
 
E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)
Vertex Holdings
 
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)
Vertex Holdings
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
Vertex Holdings
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
Vertex Holdings
 
E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
Vertex Holdings
 

More from Vertex Holdings (20)

Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?
 
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
 
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
 
E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)
 
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
 
E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)
 
E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)
 
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
 
E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)
 
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
 
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
 
E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)
 
E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
 
E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Cybersecurity | Meta Networks: Software defined perimeter platform

  • 1. Vertex Perspectives Software defined perimeter platform Meta Networks believes it’s time to update the way we approach network access and security – to leverage cloud and internet to build a global, zero-trust private network that is agile and scalable for the way business is done today. Counter-Drone Solutions for Urban Environments Goodbye VPN, Hello SDP
  • 2. Company Snapshot TEAM INVESTORS HIGHLIGHTS Founders • Founded in 2016 • HQ: Tel Aviv, Israel • Acquired by Proofpoint • Partnerships with Cisco, AWS, Talari Networks (Oracle) and Cyren • Multiple recognitions including • Finalist in the Red Herring 100 Europe and US • Wins Gold in Cybersecurity Excellence Awards • Shortlisted for Business Continuity Award • Recognition in reports by Gartner and 451 Etay Bogner, CEO A serial entrepreneur, his previous ventures include Stratoscale, Neocleus (acquired by Intel) and SofaWare (acquired by CheckPoint). Shmulik Ladkani, CTO A veteran network and security architect, previously held leadership positions at Jungo (acquired by NDS/Cisco) Ravello Systems (acquired by Oracle) . Alon Horowitz, VP R&D An expert in cloud and virtualization technologies, previously lead product development teams at Stratoscale and IBM. Acquired Meta Networks in 2019
  • 3. Industry Challenges VPNs are site centric but the way we work has changed dramatically in the last decade We used to sit in offices, using on-premise apps on private networks. Now we’re working from everywhere and our applications are migrating to the cloud. Traditional VPNs typically – • Trust-based network design • Authentication at connection • Gateways to internet • Backhauling internet traffic • Star/ mesh site-to-site connectivity • Mediocre user experience The perimeter is dissolving and security paradigms designed around the idea that users on the LAN can be trusted is not designed to meet the operational or security challenges that we face today. Trust-based ● Broad Access ● Complex to manage ● Poor UX
  • 4. Solution Overview Meta Network’s Software Defined Parameter (SDP) is user centric and addresses fragmentation and complexity of the security perimeter. It is re-architecting the perimeter for the cloud age with features of – • Zero trust: all access to applications in the data center and cloud must be granted with whitelist • Global network backbone: support millions of concurrent users • Identity based access: each device and network entity is unique • Always-on security: for any user, location or device • Rapid, simple deployment: agent and client-less • Superior user experience Meta Network-as-a-Service (NaaS) is the future of enterprise networking, abstracting the physical topology into a logical network that enables policy-based management of users and applications.
  • 5. Solution Overview Video link: https://youtu.be/zLNQuBqNhT8
  • 6. Case Studies “With Meta NaaS, we are centrally managing a zero-trust network that covers all of our applications and data, and our employees, contractors and customers. We’re growing quickly and the solution is robust and flexible enough to grow with us - it’s easy to onboard new customers and assure the granular security that we need” - Amir Mehler, Cross-Tec TL, Via Transportation Inc. “Meta Networks essentially closed any security gaps we saw with our previous setup. With the new system, each user is only exposed to the specific applications he or she needs, regardless of which data center it’s located in. Our Sales and Support teams have seen an increase in productivity because they now connect once, and access everything they need. Compared to managing VPNs in each of our data centers, the Meta NaaS solution is much simpler and more convenient both for both our IT team and our users.” - Moshe Magal, IT Team leaderCustomer Spotlight #1: Via Use Case: Manage access to cloud infrastructure Background: Via is building a ride sharing platform and licensing its technology to companies building transit systems in other locations around the world. The company is completely cloud native and has a widely distributed workforce with more than 400 employees and contractors. In addition, their transportation operator partners based in different locations required access to specific portion of Via’s platform. This was challenging in terms of segmenting and securing access as well as complex onboarding. Via’s vision was a zero-trust, user centric network security architecture enforced consistently across all groups of users regardless of their location. Results: • Enhanced security: network is protected by SDP per user that is dynamically enforced, verified and logged • Rapid customer onboarding: within minutes • Efficient cloud network management: tasks such as spending time on firewall configurations to microsegment networks are fully automated using the Meta API and are an integrated part of DevOps Customer Spotlight #1: My Heritage Use Case: Convenient and secure access Background: My Heritage is the leading global destination for discovering, preserving and sharing family history with 93M users across 196 countries, 40M family trees and 8.4B records. Employees often face delays due to slow and unreliable access to multiple data centers through multiple VPN solutions while IT team face challenges including security vulnerabilities and help desk overload Results: • One flat, logical network: Meta NaaS acts as central fabric through which all network elements are consumed and managed • Better user experience: one way to connect thus improving performance compared to VPN over internet • Enhanced security: Meta networks unified policies for easier management, enabling defined access for each user group
  • 7. Competitive Advantage The most flexible and robust SDP solution available • Zero-trust, granular “segment of 1” remote access: policy- defined user/ device/ application access limits attack surface • Cloud delivered network security: by leading vendors • Flexible connectivity: only SDP solution with OTT SD-WAN capabilities to connect clouds, data centers and users • Continuous risk and trust assessment: based on patent- pending identity based network • No hardware: simple to deploy and manage Meta Network is user-centric rather than site-centric, making it the ideal solution for network security challenges that businesses face today – from providing user-friendly remote access to connecting cloud infrastructure and reducing management costs
  • 8. Thanks for reading! About Vertex Ventures Vertex Ventures is a global network of operator-investors who manage portfolios in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand experience in transformational technologies, on-the-ground knowledge in the world’s major innovation centers and global context, connections and customers. Contributors Disclaimer This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings is under no obligation to update the information or communicate that any updates have been made. Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives. Vertex Perspectives: Cybersecurity Series • Cybersecurity | Risk. Impact. Innovations. • Cybersecurity | Axonius: Asset Management Platform • Cybersecurity | Cylus: Railway Cybersecurity • Cybersecurity | Cymulate: Breach & Attack Simulation • Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments • Cybersecurity | Indegy: Industrial Cybersecurity • Cybersecurity | Meta Networks: NaaS Software Defined Perimeter • Cybersecurity | PerimeterX: Next Generation Bot Defense • Cybersecurity | Very Good Security: SaaS Platform for Data Security