Aporeto today announced the launch of the first Zero Trust Security solution for the enterprise based on finely-tuned application identity, context and intent. The solution continuously monitors and protects applications, by replacing network security based approaches with a radically simple identity and authorization system.
Aporeto’s security is decoupled from the infrastructure and network; the solution transparently binds to applications to provide them with identity and protect them according to their context and operations intent using end-to-end cryptographic techniques. This approach is underpinned by the “zero trust” principle that assumes that any part of the infrastructure can be compromised at any given time. In contrast, the common approaches of security products are to provide static, infrastructure-dependent protection that must constantly be reconfigured to address application needs.
Enterprise Cloud Data Management leader, Informatica, is using Aporeto as the company continues to deliver and grow its portfolio of data management solutions as cloud services.
“Aporeto is accelerating our expansion to the cloud,” said Alec Chattaway, director of Cloud Infrastructure Operations for Informatica. “We can quickly reduce complexity by removing unnecessary and cumbersome supporting services, while at the same time reducing cost and increasing efficiency, resiliency and security. With Aporeto, we can secure our Linux workloads on any infrastructure with end-to-end encryption and have a path for modernizing with a security layer that is future-proofed.”
According to the Gartner Market Guide for Cloud Workload Protection Platforms, by Neil MacDonald, published March 22, 2017, “cloud-style applications tend to scale elastically, requiring protection to scale up and down on demand with usage-based licensing models that reflect this. Simply running agents designed for on-premises servers and hoping these will work in IaaS is not sufficient.” The report recommends “Security and risk management leaders tasked with acquisition, strategizing and planning should: require vendors to support the visibility and control of workloads that span physical and virtual machines, containers and multiple public cloud IaaS, all from a single policy management framework and console.”
“Network-based security solutions are failing the cloud. Firewalls, overlays, and access control lists are not capable of protecting distributed applications. By focusing on identity and cryptographic techniques, we can decouple security from the infrastructure and make security operations strong, simple and scalable,” said Dimitri Stiliadis, co-founder, and CEO of Aporeto.
Aporeto reduces complexity and strengthens security while tracking the dynamic environment at scale. It binds to any application, on a single or a distributed system, without requiring any network, OS kernel, or code changes. Aporeto protects enterprises’ applications through end-to-end authentication, authorization, and encryption on any cloud environment. By automatically creating contextually rich identity for all services and components, Aporeto offers visibility and exerts fine-grained application control for legacy and modern applications, and protects static, dynamic, or migrating assets on private, public, or hybrid clouds. Aporeto can deliver this solution as a cloud service or as an on-premises installation.