Seguridad

Software Defined Perimeter (SDP)

A major concern facing CIOs today is that more employees and contractors are working from home. How can IT provide a secure connection to authorized enterprise applications without providing access to unauthorized applications and the network infrastructure itself? And, how can IT provide access that is transparent to the users?

Verizon Software Defined Perimeter (SDP) is the zero-trust approach to networking for remote access, internal networks, and cloud applications. It can defeat network based attacks from unauthorized users and devices. It is fast and user-friendly, and it can be used standalone, or combined with Verizon's Private IP or SD-WAN services to create trusted networks. Additionally, SDP can provide secure remote access to authorized applications without making the network accessible, and it does it with multi-factor authentication that is transparent to users.

Theory of Operation

Verizon SDP sits between users and servers, and isolates servers to defeat exploits such as attacks on vulnerabilities and configuration errors. It applies multi-factor authentication to defeat credential theft while not requiring the user to continuously re-enter their passwords or multifactor authentication tokens. And it encrypts all traffic to defeat man-in-the-middle attacks.

Arquitectura

Verizon SDP consists of three main components:

  • ·        Controllers
  • ·        Gateways
  • · Clientes
  •  

Together, they help defeat unauthorized users and devices attempting to access protected applications. The figure below shows the protected applications on the right. These include: software-as-a-service (SaaS) applications; those hosted in infrastructure-as-a-Service (IaaS) or in hosting centers; applications on the DMZ; and, applications in the data center.

A major concern facing CIOs today is that more employees and contractors are working from home. How can IT provide a secure connection to authorized enterprise applications without providing access to unauthorized applications and the network infrastructure itself? And, how can IT provide access that is transparent to the users?

Verizon Software Defined Perimeter (SDP) is the zero-trust approach to networking for remote access, internal networks, and cloud applications. It can defeat network based attacks from unauthorized users and devices. It is fast and user-friendly, and it can be used standalone, or combined with Verizon's Private IP or SD-WAN services to create trusted networks. Additionally, SDP can provide secure remote access to authorized applications without making the network accessible, and it does it with multi-factor authentication that is transparent to users.

Theory of Operation

Verizon SDP sits between users and servers, and isolates servers to defeat exploits such as attacks on vulnerabilities and configuration errors. It applies multi-factor authentication to defeat credential theft while not requiring the user to continuously re-enter their passwords or multifactor authentication tokens. And it encrypts all traffic to defeat man-in-the-middle attacks.

Arquitectura

Verizon SDP consists of three main components:

  • ·        Controllers
  • ·        Gateways
  • · Clientes
  •  

Together, they help defeat unauthorized users and devices attempting to access protected applications. The figure below shows the protected applications on the right. These include: software-as-a-service (SaaS) applications; those hosted in infrastructure-as-a-Service (IaaS) or in hosting centers; applications on the DMZ; and, applications in the data center.

Features & Benefits

Software Defined Perimeter is the Zero-Trust approach to networking because it isolates the servers to defeat server exploitation, then, implements multifactor authentication to defeat credential theft, and, finally, builds end-to-end encrypted tunnels with the strongest crypto algorithm  commercially available to defeat man-in-the-middle attacks.

Core Features: 

  • Zero Trust 
  • · Lightweight physical or virtual network sensors are deployed in customer networks or in the cloud. These sensors are near real-time, highly configurable network-recording appliances that enable users to collect, filter, and analyze full network traffic - metadata and PCAP.
  • Ease of Installation,
  • ·        The NDR platform includes subscriptions for threat intelligence feeds and intrusion detection signatures, and it correlates all alerts.
  • Fast Performance.
  • · Customer gets full access to visualize their data, via web-based user interface (Visualizer). The Visualizer enables customers to view reports, manage users and policies, view and analyze threats, download packets, and receive notifications of any threat perceived in the network.
  • Beneficios claves
  • ·        Server isolation defeats exploitation attacks
  • ·        Transparent Multi-factor Authentication (MFA) defeats credential theft
  • ·        Mutual TLS defeats man-in-the-middle attacks 
  • ·        Trust assessment defeats compromised clients

Software Defined Perimeter is the Zero-Trust approach to networking because it isolates the servers to defeat server exploitation, then, implements multifactor authentication to defeat credential theft, and, finally, builds end-to-end encrypted tunnels with the strongest crypto algorithm  commercially available to defeat man-in-the-middle attacks.

Core Features: 

  • Zero Trust 
  • · Lightweight physical or virtual network sensors are deployed in customer networks or in the cloud. These sensors are near real-time, highly configurable network-recording appliances that enable users to collect, filter, and analyze full network traffic - metadata and PCAP.
  • Ease of Installation,
  • ·        The NDR platform includes subscriptions for threat intelligence feeds and intrusion detection signatures, and it correlates all alerts.
  • Fast Performance.
  • · Customer gets full access to visualize their data, via web-based user interface (Visualizer). The Visualizer enables customers to view reports, manage users and policies, view and analyze threats, download packets, and receive notifications of any threat perceived in the network.
  • Beneficios claves
  • ·        Server isolation defeats exploitation attacks
  • ·        Transparent Multi-factor Authentication (MFA) defeats credential theft
  • ·        Mutual TLS defeats man-in-the-middle attacks 
  • ·        Trust assessment defeats compromised clients

The Verizon Advantage.

Ofrecemos una gran variedad de soluciones. Como proveedor mayorista de servicios, Verizon Partner Soluciones brinda soluciones de voz, datos e Internet desde nuestra red IP privada global en más de 150 países. Proporcionamos un rendimiento de gran capacidad y velocidad mediante Ethernet de 100 gigabits estándar en nuestra red IP principal, y tenemos más de 81 nodos IP en 60 ciudades de todo el país.

Tus clientes pueden beneficiarse con un portafolio diverso de soluciones de red con nivel internacional. Si eres proveedor, proveedor local ISP, agregador, revendedor o proveedor de contenidos, podemos ayudarte a brindar una experiencia de red completa e innovadora a nivel local y global. Otórgale a tus clientes las ventajas de nuestra red de datos, acceso y Ethernet, acceso a Internet, datos UP, anillo óptico, seguridad, voz y muchas soluciones más. Hemos perfeccionado nuestros acuerdos de servicio SLA, experiencia técnica y servicios personalizables para que tú, nuestro asociado mayorista, puedas alzcanzar tus objetivos de negocio únicos.

Ofrecemos una gran variedad de soluciones. Como proveedor mayorista de servicios, Verizon Partner Soluciones brinda soluciones de voz, datos e Internet desde nuestra red IP privada global en más de 150 países. Proporcionamos un rendimiento de gran capacidad y velocidad mediante Ethernet de 100 gigabits estándar en nuestra red IP principal, y tenemos más de 81 nodos IP en 60 ciudades de todo el país.

Tus clientes pueden beneficiarse con un portafolio diverso de soluciones de red con nivel internacional. Si eres proveedor, proveedor local ISP, agregador, revendedor o proveedor de contenidos, podemos ayudarte a brindar una experiencia de red completa e innovadora a nivel local y global. Otórgale a tus clientes las ventajas de nuestra red de datos, acceso y Ethernet, acceso a Internet, datos UP, anillo óptico, seguridad, voz y muchas soluciones más. Hemos perfeccionado nuestros acuerdos de servicio SLA, experiencia técnica y servicios personalizables para que tú, nuestro asociado mayorista, puedas alzcanzar tus objetivos de negocio únicos.

Talk to a Verizon Account Manager today.

We specialize in helping wholesale carriers, resellers and third-party agents of all sizes  take on their customer's biggest challenges. Let's talk about your
customers and how our services and technology can help you transform their operations so they can achieve better business outcomes.

Click here >

We specialize in helping wholesale carriers, resellers and third-party agents of all sizes  take on their customer's biggest challenges. Let's talk about your
customers and how our services and technology can help you transform their operations so they can achieve better business outcomes.

Click here >

Precio

    Please contact us or your Account Manager for pricing. 

    Please contact us or your Account Manager for pricing.