SlideShare a Scribd company logo
1 of 8
Download to read offline
Vertex Perspectives
Software defined perimeter platform
Meta Networks believes it’s time to update the
way we approach network access and security –
to leverage cloud and internet to build a global,
zero-trust private network that is agile and
scalable for the way business is done today.
Counter-Drone Solutions
for Urban Environments
Goodbye VPN,
Hello SDP
Company Snapshot
TEAM INVESTORS HIGHLIGHTS
Founders • Founded in 2016
• HQ: Tel Aviv, Israel
• Acquired by Proofpoint
• Partnerships with Cisco, AWS, Talari
Networks (Oracle) and Cyren
• Multiple recognitions including
• Finalist in the Red Herring 100
Europe and US
• Wins Gold in Cybersecurity
Excellence Awards
• Shortlisted for Business Continuity
Award
• Recognition in reports by Gartner
and 451
Etay Bogner, CEO
A serial entrepreneur, his previous
ventures include Stratoscale,
Neocleus (acquired by Intel) and
SofaWare (acquired by CheckPoint).
Shmulik Ladkani, CTO
A veteran network and security
architect, previously held
leadership positions at Jungo
(acquired by NDS/Cisco) Ravello
Systems (acquired by Oracle) .
Alon Horowitz, VP R&D
An expert in cloud and virtualization
technologies, previously lead
product development teams at
Stratoscale and IBM.
Acquired Meta Networks in 2019
Industry Challenges
VPNs are site centric but the way we work has changed dramatically
in the last decade
We used to sit in offices, using on-premise apps on private networks.
Now we’re working from everywhere and our applications are
migrating to the cloud.
Traditional VPNs typically –
• Trust-based network design
• Authentication at connection
• Gateways to internet
• Backhauling internet traffic
• Star/ mesh site-to-site connectivity
• Mediocre user experience
The perimeter is dissolving and security paradigms designed around
the idea that users on the LAN can be trusted is not designed to
meet the operational or security challenges that we face today.
Trust-based
●
Broad Access
●
Complex to manage
●
Poor UX
Solution Overview
Meta Network’s Software Defined Parameter (SDP) is user centric
and addresses fragmentation and complexity of the security
perimeter. It is re-architecting the perimeter for the cloud age with
features of –
• Zero trust: all access to applications in the data center and cloud
must be granted with whitelist
• Global network backbone: support millions of concurrent users
• Identity based access: each device and network entity is unique
• Always-on security: for any user, location or device
• Rapid, simple deployment: agent and client-less
• Superior user experience
Meta Network-as-a-Service (NaaS) is the future of enterprise
networking, abstracting the physical topology into a logical network
that enables policy-based management of users and applications.
Solution Overview
Video link: https://youtu.be/zLNQuBqNhT8
Case Studies
“With Meta NaaS, we are centrally managing a zero-trust network that
covers all of our applications and data, and our employees, contractors and
customers. We’re growing quickly and the solution is robust and flexible
enough to grow with us - it’s easy to onboard new customers and assure the
granular security that we need”
- Amir Mehler, Cross-Tec TL, Via Transportation Inc.
“Meta Networks essentially closed any security gaps we saw with our previous
setup. With the new system, each user is only exposed to the specific
applications he or she needs, regardless of which data center it’s located in.
Our Sales and Support teams have seen an increase in productivity because
they now connect once, and access everything they need. Compared to
managing VPNs in each of our data centers, the Meta NaaS solution is much
simpler and more convenient both for both our IT team and our users.”
- Moshe Magal, IT Team leaderCustomer Spotlight #1: Via
Use Case: Manage access to cloud infrastructure
Background: Via is building a ride sharing platform and licensing its technology
to companies building transit systems in other locations around the world. The
company is completely cloud native and has a widely distributed workforce with
more than 400 employees and contractors. In addition, their transportation
operator partners based in different locations required access to specific
portion of Via’s platform. This was challenging in terms of segmenting and
securing access as well as complex onboarding. Via’s vision was a zero-trust,
user centric network security architecture enforced consistently across all
groups of users regardless of their location.
Results:
• Enhanced security: network is protected by SDP per user that is
dynamically enforced, verified and logged
• Rapid customer onboarding: within minutes
• Efficient cloud network management: tasks such as spending time on
firewall configurations to microsegment networks are fully automated using
the Meta API and are an integrated part of DevOps
Customer Spotlight #1: My Heritage
Use Case: Convenient and secure access
Background: My Heritage is the leading global destination for discovering, preserving
and sharing family history with 93M users across 196 countries, 40M family trees
and 8.4B records. Employees often face delays due to slow and unreliable access to
multiple data centers through multiple VPN solutions while IT team face challenges
including security vulnerabilities and help desk overload
Results:
• One flat, logical network: Meta NaaS acts as central fabric through which all
network elements are consumed and managed
• Better user experience: one way to connect thus improving performance
compared to VPN over internet
• Enhanced security: Meta networks unified policies for easier management,
enabling defined access for each user group
Competitive Advantage
The most flexible and robust SDP solution available
• Zero-trust, granular “segment of 1” remote access: policy-
defined user/ device/ application access limits attack surface
• Cloud delivered network security: by leading vendors
• Flexible connectivity: only SDP solution with OTT SD-WAN
capabilities to connect clouds, data centers and users
• Continuous risk and trust assessment: based on patent-
pending identity based network
• No hardware: simple to deploy and manage
Meta Network is user-centric rather than site-centric, making it the
ideal solution for network security challenges that businesses face
today – from providing user-friendly remote access to connecting
cloud infrastructure and reducing management costs
Thanks for reading!
About Vertex Ventures
Vertex Ventures is a global network of operator-investors who manage portfolios
in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand
experience in transformational technologies, on-the-ground knowledge in the
world’s major innovation centers and global context, connections and customers.
Contributors
Disclaimer
This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and
industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable
and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings
is under no obligation to update the information or communicate that any updates have been made.
Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives.
Vertex Perspectives: Cybersecurity Series
• Cybersecurity | Risk. Impact. Innovations.
• Cybersecurity | Axonius: Asset Management Platform
• Cybersecurity | Cylus: Railway Cybersecurity
• Cybersecurity | Cymulate: Breach & Attack Simulation
• Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments
• Cybersecurity | Indegy: Industrial Cybersecurity
• Cybersecurity | Meta Networks: NaaS Software Defined Perimeter
• Cybersecurity | PerimeterX: Next Generation Bot Defense
• Cybersecurity | Very Good Security: SaaS Platform for Data Security

More Related Content

What's hot

Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
CSAIsrael
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 

What's hot (20)

The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 

Similar to Cybersecurity | Meta Networks: Software defined perimeter platform

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
 

Similar to Cybersecurity | Meta Networks: Software defined perimeter platform (20)

Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
ATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - JagsATC Delta Elite Dinner - 4.15.21 - Jags
ATC Delta Elite Dinner - 4.15.21 - Jags
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 

More from Vertex Holdings

More from Vertex Holdings (20)

Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?
 
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
 
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
 
E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)
 
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
 
E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)
 
E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)
 
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
 
E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)
 
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
 
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
 
E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)
 
E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
 
E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Cybersecurity | Meta Networks: Software defined perimeter platform

  • 1. Vertex Perspectives Software defined perimeter platform Meta Networks believes it’s time to update the way we approach network access and security – to leverage cloud and internet to build a global, zero-trust private network that is agile and scalable for the way business is done today. Counter-Drone Solutions for Urban Environments Goodbye VPN, Hello SDP
  • 2. Company Snapshot TEAM INVESTORS HIGHLIGHTS Founders • Founded in 2016 • HQ: Tel Aviv, Israel • Acquired by Proofpoint • Partnerships with Cisco, AWS, Talari Networks (Oracle) and Cyren • Multiple recognitions including • Finalist in the Red Herring 100 Europe and US • Wins Gold in Cybersecurity Excellence Awards • Shortlisted for Business Continuity Award • Recognition in reports by Gartner and 451 Etay Bogner, CEO A serial entrepreneur, his previous ventures include Stratoscale, Neocleus (acquired by Intel) and SofaWare (acquired by CheckPoint). Shmulik Ladkani, CTO A veteran network and security architect, previously held leadership positions at Jungo (acquired by NDS/Cisco) Ravello Systems (acquired by Oracle) . Alon Horowitz, VP R&D An expert in cloud and virtualization technologies, previously lead product development teams at Stratoscale and IBM. Acquired Meta Networks in 2019
  • 3. Industry Challenges VPNs are site centric but the way we work has changed dramatically in the last decade We used to sit in offices, using on-premise apps on private networks. Now we’re working from everywhere and our applications are migrating to the cloud. Traditional VPNs typically – • Trust-based network design • Authentication at connection • Gateways to internet • Backhauling internet traffic • Star/ mesh site-to-site connectivity • Mediocre user experience The perimeter is dissolving and security paradigms designed around the idea that users on the LAN can be trusted is not designed to meet the operational or security challenges that we face today. Trust-based ● Broad Access ● Complex to manage ● Poor UX
  • 4. Solution Overview Meta Network’s Software Defined Parameter (SDP) is user centric and addresses fragmentation and complexity of the security perimeter. It is re-architecting the perimeter for the cloud age with features of – • Zero trust: all access to applications in the data center and cloud must be granted with whitelist • Global network backbone: support millions of concurrent users • Identity based access: each device and network entity is unique • Always-on security: for any user, location or device • Rapid, simple deployment: agent and client-less • Superior user experience Meta Network-as-a-Service (NaaS) is the future of enterprise networking, abstracting the physical topology into a logical network that enables policy-based management of users and applications.
  • 5. Solution Overview Video link: https://youtu.be/zLNQuBqNhT8
  • 6. Case Studies “With Meta NaaS, we are centrally managing a zero-trust network that covers all of our applications and data, and our employees, contractors and customers. We’re growing quickly and the solution is robust and flexible enough to grow with us - it’s easy to onboard new customers and assure the granular security that we need” - Amir Mehler, Cross-Tec TL, Via Transportation Inc. “Meta Networks essentially closed any security gaps we saw with our previous setup. With the new system, each user is only exposed to the specific applications he or she needs, regardless of which data center it’s located in. Our Sales and Support teams have seen an increase in productivity because they now connect once, and access everything they need. Compared to managing VPNs in each of our data centers, the Meta NaaS solution is much simpler and more convenient both for both our IT team and our users.” - Moshe Magal, IT Team leaderCustomer Spotlight #1: Via Use Case: Manage access to cloud infrastructure Background: Via is building a ride sharing platform and licensing its technology to companies building transit systems in other locations around the world. The company is completely cloud native and has a widely distributed workforce with more than 400 employees and contractors. In addition, their transportation operator partners based in different locations required access to specific portion of Via’s platform. This was challenging in terms of segmenting and securing access as well as complex onboarding. Via’s vision was a zero-trust, user centric network security architecture enforced consistently across all groups of users regardless of their location. Results: • Enhanced security: network is protected by SDP per user that is dynamically enforced, verified and logged • Rapid customer onboarding: within minutes • Efficient cloud network management: tasks such as spending time on firewall configurations to microsegment networks are fully automated using the Meta API and are an integrated part of DevOps Customer Spotlight #1: My Heritage Use Case: Convenient and secure access Background: My Heritage is the leading global destination for discovering, preserving and sharing family history with 93M users across 196 countries, 40M family trees and 8.4B records. Employees often face delays due to slow and unreliable access to multiple data centers through multiple VPN solutions while IT team face challenges including security vulnerabilities and help desk overload Results: • One flat, logical network: Meta NaaS acts as central fabric through which all network elements are consumed and managed • Better user experience: one way to connect thus improving performance compared to VPN over internet • Enhanced security: Meta networks unified policies for easier management, enabling defined access for each user group
  • 7. Competitive Advantage The most flexible and robust SDP solution available • Zero-trust, granular “segment of 1” remote access: policy- defined user/ device/ application access limits attack surface • Cloud delivered network security: by leading vendors • Flexible connectivity: only SDP solution with OTT SD-WAN capabilities to connect clouds, data centers and users • Continuous risk and trust assessment: based on patent- pending identity based network • No hardware: simple to deploy and manage Meta Network is user-centric rather than site-centric, making it the ideal solution for network security challenges that businesses face today – from providing user-friendly remote access to connecting cloud infrastructure and reducing management costs
  • 8. Thanks for reading! About Vertex Ventures Vertex Ventures is a global network of operator-investors who manage portfolios in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand experience in transformational technologies, on-the-ground knowledge in the world’s major innovation centers and global context, connections and customers. Contributors Disclaimer This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings is under no obligation to update the information or communicate that any updates have been made. Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives. Vertex Perspectives: Cybersecurity Series • Cybersecurity | Risk. Impact. Innovations. • Cybersecurity | Axonius: Asset Management Platform • Cybersecurity | Cylus: Railway Cybersecurity • Cybersecurity | Cymulate: Breach & Attack Simulation • Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments • Cybersecurity | Indegy: Industrial Cybersecurity • Cybersecurity | Meta Networks: NaaS Software Defined Perimeter • Cybersecurity | PerimeterX: Next Generation Bot Defense • Cybersecurity | Very Good Security: SaaS Platform for Data Security