The IT security landscape is changing fast, and the traditional perimeter-based methods are no longer effective in mitigating the risk of insider threats. As the walls of the perimeter break down, a new architecture is emerging that better aligns with how companies work in the modern cloud era - The Zero Trust model.
As the leader in Zero Trust security solutions for the enterprise, we are pleased to introduce the ScaleFT Access Fabric – a globally distributed system that makes lightning fast authorization decisions against custom policies based on dynamic user and device data. The Access Fabric is a key component of the ScaleFT Platform for managing access to corporate resources.
We are opening up the ScaleFT Access Fabric to select customers through a pre-release program. We will work closely with you to design your Zero Trust security architecture, migrate company resources to a better protection model through ScaleFT, and create the right access policy framework for your organization. Tell us a bit about yourself and we'll follow-up right away.
Making real-time trust decisions based on dynamic conditions requires a new architecture that can adapt to changing environments in real-time. We’ve developed our Access Fabric as a key component of the ScaleFT Platform to do just that.
A reverse proxy service sits in front of every protected resource, acting as a gateway for all traffic. The service centralizes the access controls and is an ideal logging and monitoring point.
We are continually collecting user, device, and session attributes and state through a globally distributed kafka-based architecture to make smarter trust decisions on-demand.
Every request to a protected resource is authorized against the access policies, where real-time context is matched against the data collected by the Stream Processor.
To improve the user and experience and encourage better security posture, the output of denied requests are displayed as human readable messages with self-remediation tips.