Zero Trust Access Management

We’re breaking down the walls of traditional perimeter-based security measures by introducing a better architecture based on the principles of Zero Trust

Gain confidence that your sensitive company resources are secure

Only ScaleFT offers a comprehensive Zero Trust platform that unifies access controls across all user and resource types, saving you from having to deploy and manage disparate PAM and IAM products

ScaleFT Zero Trust Server Access
Server Access

Securely connect to Linux and Windows servers over SSH and RDP through a client certificate-backed architecture that eliminates the use of static credentials

Learn More

ScaleFT Zero Trust Web Access
Web Access

Manage who has access to what company web apps through a simple policy-based framework that authenticates and authorizes every request in real-time

Learn More

The ScaleFT Access Fabric

Making real-time trust decisions based on dynamic conditions requires a lightning fast, globally distributed environment. We’ve developed our Access Fabric as a key component of the ScaleFT Platform to do just that and more.

ScaleFT Access Fabric
Gateway Service

A reverse proxy service sits in front of every protected resource, acting as a gateway for all traffic. The service centralizes the access controls and is an ideal logging and monitoring point.

Stream Processor

We are continually collecting user, device, and session attributes and state through a globally distributed kafka-based architecture to make smarter trust decisions on-demand.

Authorization Engine

Every request to a protected resource is authorized against the access policies, where real-time context is matched against the data collected by the Stream Processor.

Remediation Helper

To improve the user and experience and encourage better security posture, the output of denied requests are displayed as human readable messages with self-remediation tips.

Core Platform Features

Dynamic Trust Attestation

ScaleFT makes smarter authorization decisions by factoring in the context of each request, as opposed to the traditional perimeter based methods

  • Trust decisions removed from the network and placed at the endpoints
  • Factors in user and device conditions at the time of each request
  • Trust is continually re-evaluated to account for changing environments
Dynamic Trust Attestation
Configurable Access Policies
Configurable Access Policies

Managers can easily customize who has access to what resources through a simple policy framework that accounts for user, device, and session data

  • Easy to grok fact-based framework where attributes must be true to be authorized
  • Policies can be tuned for each team for more granular access management
  • Managers can use the Dashboard to create and edit policies with ease
Centralized Access Controls

Every request flows through a central gateway for consistent authentication and authorization, as well as providing a unified monitoring and logging point

  • A reverse proxy service is placed in front of every resource to handle every request
  • Integrates with any Identity Provider and OIDC, SAML, LDAP, or ADFS
  • Integrates with a wide range of logging and SIEM services
Centralized Access Controls
Real-time Auth Processing
Real-time Auth Processing

The ScaleFT Access Fabric is globally distributed and highly performant, enabling fast authentication and authorization that doesn’t interrupt the user workflow

  • Kafka-backed architecture for fast stream processing
  • Authentication process integrated natively with your Identity Provider
  • Authorization processing done at the edge against the access policies
Ephemeral Credentials

Every authorized request issues a single-use client certificate or web token scoped to the user, device, and resource being accessed

  • No need to manage a revocation list, rotation policy or keep credentials in a vault
  • Built-in Certificate Authority issues client certificates with fast expiration
  • User and device metadata injected into credentials
Ephemeral Credentials
End-to-end Visibility
End-to-end Visibility

ScaleFT is continually collecting user and device attributes and state to make trust decisions, along with auditing all login and session events

  • Monitors all user devices to track if the software is up-to-date and the disks are encrypted
  • Every event is logged with object references for clear understanding of behaviors
  • All objects and events are viewable via the Dashboard

Platform Architecture

The ScaleFT platform is a globally distributed set of cloud native components built for performance, reliability, and security

ScaleFT Zero Trust Platform Architecture Diagram
  • Our Client app is supported across every major operating system

  • The Access Fabric is designed for low latency authorization processing

  • Our Core Platform is feature-rich including custom built-in PKI
  • We integrate with a wide range of Identity Providers and DevOps tools

  • All traffic is authenticated, authorized, and encrypted from end-to-end

  • We offer an admin dashboard, extendable API and CLI on top

Ready to go Zero Trust?

All of our plans start with a 30 day free trial. No credit card required. See our flexible Pricing Plans.

Start a Free Trial Request a Demo