Best Software-Defined Perimeter (SDP) Software in the UK - Page 2

Compare the Top Software-Defined Perimeter (SDP) Software in the UK as of November 2024 - Page 2

  • 1
    Wandera

    Wandera

    Wandera

    Unified real-time security for your remote users, wherever they are and however they connect. One single security solution for all your remote users, that spans use cases from threat protection to content filtering and zero trust network access, and covers smartphones, tablets and laptops. One unified analytics and policy engine that lets you configure once and apply everywhere. Your users have moved outside the perimeter, and your data has moved to the cloud. Wandera’s cloud-first approach ensures a consistent and seamless security and usability experience for all remote users, and doesn’t suffer from the challenges of extending legacy architectures to today’s new way of working. Our high-performance cloud platform scales vertically and horizontally on demand to deliver real-time security across 30+ global locations. Informed by 425 million sensors across our global network, the MI:RIAM threat intelligence engine always stays ahead of the evolving threat landscape.
  • 2
    Barracuda CloudGen Access

    Barracuda CloudGen Access

    Barracuda Networks

    Securely manage your remote workforce with instant provisioning of company or employee-owned devices and unmanaged contractor endpoints. Mitigate breach risks with Zero Trust secure access. Deliver continuous verification of user and device identity and trust to reduce attack surface. Empower employees with streamlined access, increased security and upgraded performance compared to traditional VPN technology. Security starts with access. The CloudGen Access Zero Trust model establishes unparalleled access control across users and devices without the performance pitfalls of a traditional VPN. It provides remote, conditional, and contextual access to resources and reduces over-privileged access and associated third-party risks. With CloudGen Access, employees and partners can access corporate apps and cloud workloads without creating additional attack surfaces.
  • 3
    ColorTokens Xtended ZeroTrust Platform
    The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection. Visibility across on-premise & multiclouds. Micro-segment for cloud workload protection. Stop ransomware from owning your endpoints. See all communication between processes, files, users, applications, and workloads. Identify security gaps with built-in threat and vulnerability assessment. Simple and faster time-to-compliance (for HIPAA, PCI, GDPR). Easily create ZeroTrust Zones™ and drastically reduce the attack surface. Dynamic policies that protect workloads migrating to the cloud. Block lateral threats without cumbersome VLANs/ACLs or firewall rules. Lockdown any endpoint by automatically allowing only whitelisted processes. Block zero day or fileless exploits, and stop communication to C&C servers.
  • 4
    Symantec Integrated Cyber Defense
    The Symantec Integrated Cyber Defense (ICD) Platform delivers Endpoint Security, Identity Security, Information Security, and Network Security across on-premises and cloud infrastructures to provide the most complete and effective asset protection in the industry. Symantec is the first and only company to unify and coordinate security. Functions across both cloud and on-premises systems. Symantec enables enterprises to embrace the cloud as it makes sense for them, without sacrificing past investments and reliance on critical infrastructure. We know Symantec will never be your only vendor. That’s why we created Integrated Cyber Defense Exchange (ICDx), which makes it easy to integrate third-party products and share intelligence across the platform. Symantec is the only major cyber defense vendor that builds solutions to support all infrastructures, whether entirely on-premises, entirely in the cloud, or a hybrid of the two.
  • 5
    Cisco DNA Center
    Cisco DNA Center is the network management and command center for Cisco DNA, your intent-based network for the enterprise. Provision and configure all your network devices in minutes. Use advanced artificial intelligence (AI) and machine learning (ML) to proactively monitor, troubleshoot, and optimize your network. Integrate with third-party systems for improved operational processes.​ Cisco DNA Center is a powerful network controller and management dashboard that can help you take charge of your network, optimize your Cisco investment, and lower your IT spending. Translate business intent into zero-trust network policies. Identify all endpoints and optimize user experience based on business requirements. Automate deployment and management of network devices and integration of security solutions, to promote consistency across configurations, reduce errors, and save time.
  • 6
    Pica8 PICOS
    The one-of-a-kind PICOS open NOS with tightly coupled control planes gives network operators surgical, non-disruptive control of their enterprise applications, deep and dynamic traffic monitoring, and even attack mitigation, all in real time. There’s no better way to implement zero-trust networking and software-defined perimeters than PICOS. Our flagship open network operating system installs on 1G- to 100G-interface open switches from a broad array of Tier 1 manufacturers. This fully featured license offers the most comprehensive support for enterprise features on the market. It includes the Debian Linux distribution, with an unmodified kernel for maximum DevOps programmability. Enterprise Edition also includes AmpCon, an Ansible-based automation framework that couples Zero-Touch Provisioning (ZTP) with the Open Network Install Environment (ONIE) to simplify installation and operation of open network switches across the enterprise.
  • 7
    Sweepatic

    Sweepatic

    Sweepatic

    Sweepatic has received the “Cybersecurity Made in Europe” label from the European Cyber Security Organisation (ECSO). This certification is awarded to European IT security companies and recognizes them for their reliable and trustworthy solutions. Sweepatic offers a premium Attack Surface Management Platform. With Sweepatic you get to know your attack surface and its exposure outside in. Because in cyberspace you don’t want to be an obvious target for bad actors. Overview of key information elements about your attack surface allowing to drill down to all details. Action center of structured and prioritized observations in function of criticality requiring remediation. A visual overview of your websites and their response status. A topological, bird’s eye view of your global attack surface with all assets and their interrelation. Knowing what to protect based on actionable insights is key.
  • 8
    NetFoundry

    NetFoundry

    NetFoundry

    Your private overlay network connects all devices, edges and clouds, with zero trust network access security, and SASE framework security. Your private network is an overlay on NetFoundry's industry-leading Fabric (NetFoundry founders hold 20+ Internet optimization patents), which provides an additional layer of security on top of zero trust, and enables Internet optimization. Spin up your network in minutes. You only deploy software endpoints. Your private network overlays the NetFoundry Fabric - the world's most secure, performant Fabric. Zero trust security from any endpoint - including IoT and mobile. SASE security at your branches, private data centers and cloud edges. Control your cloud native networking from web console, or use your DevOps tools. Single pane of glass control, regardless of underlying networks or clouds, across all endpoints.
  • 9
    Symatec Secure Access Cloud
    Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principles in delivering point-to-point connectivity without agents or appliances, eliminating network level threats. Secure Access Cloud provides point-to-point connectivity at the application level, cloaking all resources from the end-user devices and the internet. The network-level attack surface is entirely removed, leaving no room for lateral movement and network-based threats. Its simple-to-set, fine-grained and easy-to-manage access and activity policies prevent unauthorized access to the corporate resources by implementing continuous, contextual (user, device and resource-based context) authorization to enterprise applications allowing secured employee, partners and BYOD access.
  • 10
    SAIFE Connect
    The well-defined, locked-down perimeter no longer exists. As applications, people and data have grown increasingly distributed, the perimeter has moved to wherever your users are and to whichever internet connected devices they’re using, and it’s more porous than ever. If you think your traditional perimeter-centric defenses are protecting it, think again. It’s time to turn-off your VPN and turn-to SAIFE®. SAIFE Connect eliminates the concepts of a traditional network perimeter and trusted users and devices. Instead, creating on-demand, zero trust network micro-perimeters for each connected device based on attributes such as user identity, device identity, location, date, time and device posture. Zero trust security monitoring ensures that devices are continuously evaluated as long as they remain connected and are immediately quarantined when found to be out of compliance.
  • 11
    BlackRidge Transport Access Control
    Security is an arms race. Innovation happens simultaneously on the attack and protects sides of the environment. By authenticating identity and implementing security policy at the earliest possible time, on the first packet of a network session setup, BlackRidge provides deterministic, scalable, and cost-effective cyber defense. BlackRidge Transport Access Control (TAC), using our patented First Packet Authentication™, provides a new level of cyber defense for network and cloud resources. TAC operates pre-session, in real-time, before other security defenses engage. TAC is address and topology independent, supporting NAT and automatically adjusting to changing network topologies. Cyber-attacks are stopped dead in their tracks by preventing unauthorized users and attackers from performing reconnaissance of network and cloud resources, and by denying them the ability to communicate anonymously.
  • 12
    CryptoFlow Net Creator

    CryptoFlow Net Creator

    Certes Networks

    The FIPS 140-2 and Common Criteria EAL4+ certified Certes Enforcement Points (CEPs) are multi-layer encryption appliances that provide data protection and application segmentation. Delivering security products that have been tested and validated against these rigorous standards is critical to helping organizations and government agencies comply with data protection regulations. These CEPs integrate easily into any existing network and operate transparently to the network infrastructure, which ensures all data is encrypted without impacting network performance. The CEPs are interoperable with our key management software, CryptoFlow® Net Creator, and are easy to install, scalable for any size infrastructure, and simple to manage. With dedicated CEP appliances, customers experience high encryption throughput without impacting performance. With ultimate simplicity and flexibility, CEPs are used to support encryption at any network layer, providing security management and protection.
  • 13
    Dispel

    Dispel

    Dispel

    The industry's fastest remote access system that exceeds cybersecurity standards. Remote access is useful only if your team chooses to use it. That means it must be more than a security spec sheet. It must be fast, intuitive, and yes, look good. A person on a company's warehouse tablet selects the system they need to reach. Device and protocol whitelisting are hidden from view. The intense escalation of demand under COVID broke the administrative processes underlying most remote access systems. Reestablish and maintain coherent control of your networks using Dispel, a platform built to condense information to the essentials and automate the task waterfalls that would otherwise bog down changepoint decisions. A vendor requests access through a form by defining their identity, reason for access, access scope, and time frame. The request is logged and automatically sent to an administrator, who can approve or deny the request.
  • 14
    FortiGate Secure SD-WAN
    Fortinet FortiGate delivers fast, scalable, and flexible Secure SD-WAN for cloud-first, security-sensitive, and global enterprises. Our security-driven networking approach consolidates SD-WAN, next-generation firewall (NGFW), and advanced routing to deliver superior quality of experience at any scale. Accelerate network and security convergence, and simplify WAN architecture. Orchestrate consistent network and security policies. Achieve operational efficiencies through automation, deep analytics, and self-healing. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency.
  • 15
    MetaAccess
    Security teams face challenges with increasing work-from-home scenarios, and lack visibility and control over what devices are accessing their network and if they're secure. Adding to the complexity is the myriad point products generally needed to gain this visibility and control. MetaAccess is one solution giving your organization secure network access and deep endpoint compliance. With this one platform approach, you can greatly simplify ongoing management, reducing time, effort and most importantly, risk. Common cybersecurity issues include Advanced Persistent Threats and Distributed Denial of Service (DDoS) attacks. Remote workers are particularly vulnerable to these attacks, and we need a more effective solution than the VPN of old. Software Defined Perimeter (SDP) increases security without increased cost or throughput degradation compared to VPN solutions, with a better overall user experience.
  • 16
    Telos Ghost

    Telos Ghost

    Telos Corporation

    Telos Ghost prevents attackers from discovering your critical assets by making them invisible to cyber adversaries. Powered by patented technologies that vary network pathways, route traffic among dynamic IP addresses, and adds multiple layers of encryption, Telos Ghost makes it impossible to track your online traffic. Cyber attacks — especially ransomware attacks on critical assets — can bring your operations to a screeching halt. Telos Ghost hides your critical assets in a labyrinth of anonymous nodes, so that they remain impenetrable even if there is a breach. The most effective way to keep your network, people and assets safe is to make them disappear.
  • 17
    Verizon Software Defined Perimeter (SDP)
    Verizon Software Defined Perimeter (SDP) is a Zero Trust approach to networking for remote access, internal networks and cloud applications. The high-performance solution can help defeat network-based attacks from unauthorized users and devices. One of the top concerns of CIOs today is cloud adoption with many enterprises using two or more cloud vendors. This provides great agility, but often involves the hairpinning of data to access the applications. That makes for lower performance and slower access for users. A second concern is that more employees and contractors are working from home. Verizon SDP can help solve these problems, isolating enterprise and cloud applications from unauthorized users and devices while providing direct, fast access to applications for authorized users on authorized devices.
  • 18
    Waverley Labs SDP
    Waverley Labs then worked closely with CSA and DHS to develop the industry’s first Open Source reference implementation for version 1 specification for DDoS. Federal organizations, critical infrastructure providers, and businesses that rely on cloud delivery are able use these open source software releases to develop cloud services that are resistant to DDoS attacks and more. Removing access to business applications on the internet is reducing attacks. Device posture & identity verified before access granted. Cloud Security Alliance created SDP for its members. SDP connectivity based on need-to-know access model.
  • 19
    Citrix Workspace Essentials
    Citrix Workspace Essentials delivers VPN-less, centralized access and SSO to SaaS, internal web apps, and files to users with a focus on optimizing the employee’s experience. Watch how Citrix Workspace Essentials provides a more secure and scalable access to company resources through. Unified access and SSO to SaaS, web apps, and files through Citrix Workspace. Multi-factor authentication with support for 3rd party IDPs. Simplified user and app onboarding and publishing. Essentials is an entry level service. For more advanced security features such as secure browser, web filtering, and cloud app control, explore Citrix Secure Private Access.
  • 20
    CloudConnexa
    Take the high cost and complexity out of secure networking with a service built for businesses like yours with CloudConnexa. Connect your applications, private networks, workforce, and IoT devices — without complex, hard-to-scale hardware or self-managed server software. Your CloudConnexa dedicated secure overlay network blocks malicious network activity by enabling Zero Trust access to all applications, the internet, and site-to-site networking. Plus, the CloudConnexa full-mesh network is accessible from 30+ worldwide locations. CloudConnexa makes it easier than ever for you to implement scalable and secure network access, with the most critical features and functions you need to connect and protect your network.
  • 21
    ZoneZero

    ZoneZero

    Safe-T Data

    ZoneZero® enables organizations to implement identity-based security and add per-application secondary multi-factor authentication (MFA) for all types of users – network users, VPN users, remote access (ZTNA, SDP, PAM) users, etc. Secondary MFA can be added to any type of application (legacy applications, proprietary services, RDP, file shares, SSH, SFTP, web applications, databases, etc) without the need to redesign the network, applications, or remote access solutions. Creates true separation of the data and control planes. Applies application-level policies for all of your users. Enables you to apply identity-based segmentation in your network. Introduces MFA to any VPN, service, or application. Central management for full transparency and efficacy. Seamless implementation and rapid deployment.