Secure Access

AppGate

Context-Aware Secure Access Gateway Connects Users, Apps and Services

The growth of enterprise collaboration, consumption of information on personal devices, and mobile distributed workers has resulted in the collapse of the traditional network. Today, users require access to business applications, data and services whether at work or on the road. And in today’s globally connected business environment, those users could be employees, partners or customers.

In the new world of pervasive internal and external threats, distributed organizations and global ecosystems, the perimeter is more porous and less relevant than ever. The old models simply aren’t working. We need to move from perimeter-centric, port and IP-focused security to a model that focuses on securing the entire path from user to application, device to service.

Greater Flexibility, Higher Security

AppGate is an integrated security gateway that provides application and service-specific authentication and authorization for controlling access inside and from outside the perimeter. A context-aware architecture enables access to be granted based on user-specific variables, including location, device and role. Firewall rules aren’t written once and saved forever, but are created and enforced in real time when access is requested. This provides a secure, encrypted, service-specific connection to each individual app or service rather than open access to an entire network segment. And AppGate provides exhaustive documentary evidence of access to systems and documents for compliance auditors.

Out of Sight, Out of Reach

Traditional perimeter security models check credentials at the door and then provide access to an entire network segment. Certain services may be blocked to a user at the port and IP address, but the physical devices are still present on the network, and a visible lock is a vulnerable lock. AppGate’s service-specific connections abstract applications and resources from the underlying physical infrastructure, which means that non-approved services aren’t just hidden – they’re simply not visible on the network at all. Can’t be seen, can’t be compromised.

From Ports and IPs to Users and Apps

AppGate expands the traditional model beyond IP addresses and ports, and allows you to manage access at the most relevant and critical level – from user to app and service to service, on a case by case basis. This provides a secure, encrypted, point-to-point tunnel to protect network resources and provision access from any device in any location.

Protection from Every Angle

Today’s IT environments have evolved beyond the notion of a flat, trusted corporate network, with various levels of access needed within the four walls of an enterprise. AppGate provides simple and secure internal network segmentation with roaming features, allowing access to sensitive applications and data to be managed automatically as users move through office buildings and departments. AppGate’s inside/outside model provides unparalleled protection against internal, as well as external threats.

​AppGate Advantages

Integrated

Replaces multiple, non-integrated products with a single solution providing centralized policy management, enforcement and reporting for compliance

Comprehensive

Internal network segmentation and access control provides comprehensive protection from internal and external threats

Extensible

AppGate Satellites allow you to extend access control into any location, however remote

Context Aware

Uses intelligent, contextual access control to leverage directory information and real-time variables to provide higher security through greater flexibility and responsiveness

Secure

Provides fortified, end-to-end defense against internal and external threats through a real-time, centrally managed access gateway and encrypted service-specific tunnels

Easy to Use

PC, mobile and browser clients make secure access easy, from any location

Case Study

Aintree (NHS)

Aintree (NHS)

The Trust required a cost effective remote access solution, which incorporated secure connectivity and strong authentication as standard, to provide strong security and ease of use for employees. In addition, they wanted to accommodate third party access if required; so the solution needed to be flexible in terms of access options and controls.

Read the Aintree (NHS) StoryGet Adobe Reader

Resources and Related Literature