Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Kemp Launches Zero Trust Architecture to Simplify Secure Application Access

  • Zero Trust Access Gateway enables customers to use ADC deployments for fine-tuned access control with published applications and services

Kemp, the always-on application experience (AX) company, announces the launch of its Zero Trust Access Gateway (ZTAG) architecture to simplify the introduction of a zero-trust model for securing published workloads and services. The Kemp ZTAG solution is comprised of a suite of proxy, authentication, access logic, and automation capabilities that helps customers apply zero trust logic to load balanced web-based applications.

Zero Trust in a Borderless World

The increase in work-from-home, hybrid cloud, BYOD, and IoT blurs the border between what is on premises and what is beyond the perimeter. This raises new challenges around maintaining compliance and a consistent security posture without detriment to the easy access to services for users. IT organizations must respond to the expanding network edge while finding reliable ways of providing secure application access to users.

Recommended AI News: DIGISEQ Unlocks the Mass Passive Wearables Market With Rapid Contacless Personalisation on iPhone

Load Balancers as Zero Trust Engines

Related Posts
1 of 40,572

As the primary termination endpoint for published applications, load balancers are optimally positioned to contribute to a comprehensive zero trust model. The Kemp Zero Trust Access Gateway architecture enables Kemp LoadMaster deployments to protect critical applications by applying active traffic steering based on customer location and the security zone level of backend services. Service access is determined based on characteristics such as security group membership, source network and information embedded in the HTTP communication. A Policy Builder based on Kemp’s full-featured API allows for automated and streamlined creation and application of ZTAG configurations.

“Zero trust is the future of application access and continues to gain traction for customers,” said Jason Dover, VP of Product Strategy for Kemp. “Kemp is leveraging the privileged position of the load balancer combined with our extensible automation framework to help customers simplify the introduction of a zero trust model into their application ecosystem.”

Recommended AI News: Cordial Appoints Rachel Bergman as Chief Revenue Officer

Integrated Approach for Zero Trust

Since a connecting client that appears to be safe may change state if compromised, combining initial access and authentication with ongoing verification at the upper layers of the application stack is critical. When enabled, Kemp’s embedded web application firewall (WAF) and intrusion prevention system (IPS) inspects authenticated client traffic for violations and prevents exploits from being carried out by threat actors. Integration with IP reputation sources further prevents known adversaries from ever gaining access to protected applications.

Unlike other zero trust approaches, Kemp provides the added benefit of deep network telemetry which enables detailed insights on protected application services. When coupled with Kemp’s on portfolio of network visibility products network and security operators are enabled to get ahead of performance and threat issues that could negatively impact application experience.

Recommended AI News: DIGISEQ Unlocks the Mass Passive Wearables Market With Rapid Contacless Personalisation on iPhone

Comments are closed.