Join our Pre-Release Program

ScaleFT Access Fabric

The Zero Trust Approach to Security

Join Now!

The IT security landscape is changing fast, and the traditional perimeter-based methods are no longer effective in mitigating the risk of insider threats. As the walls of the perimeter break down, a new architecture is emerging that better aligns with how companies work in the modern cloud era - The Zero Trust model.

As the leader in Zero Trust security solutions for the enterprise, we are pleased to introduce the ScaleFT Access Fabric – a globally distributed system that makes lightning fast authorization decisions against custom policies based on dynamic user and device data. The Access Fabric is a key component of the ScaleFT Platform for managing access to corporate resources.

We are opening up the ScaleFT Access Fabric to select customers through a pre-release program. We will work closely with you to design your Zero Trust security architecture, migrate company resources to a better protection model through ScaleFT, and create the right access policy framework for your organization. Tell us a bit about yourself and we'll follow-up right away.

Request to Join the Program

The ScaleFT Access Fabric in Action

Making real-time trust decisions based on dynamic conditions requires a new architecture that can adapt to changing environments in real-time. We’ve developed our Access Fabric as a key component of the ScaleFT Platform to do just that.

Gateway Service

A reverse proxy service sits in front of every protected resource, acting as a gateway for all traffic. The service centralizes the access controls and is an ideal logging and monitoring point.

Stream Processor

We are continually collecting user, device, and session attributes and state through a globally distributed kafka-based architecture to make smarter trust decisions on-demand.

Authorization Engine

Every request to a protected resource is authorized against the access policies, where real-time context is matched against the data collected by the Stream Processor.

Remediation Helper

To improve the user and experience and encourage better security posture, the output of denied requests are displayed as human readable messages with self-remediation tips.

Ready to go Zero Trust?

All of our plans start with a 30 day free trial. No credit card required. See our flexible Pricing Plans.

Start a Free Trial Request a Demo