Listing Thumbnail

    Cloudbric Private Access Solution (PAS)

     Info
    Cloudbric Private Access Solution (PAS) is a Zero Trust Network Access (ZTNA) solution that provides safe and easy application access from anywhere at any time that utilizes Software-Defined Perimeter (SDP) technology.
    Listing Thumbnail

    Cloudbric Private Access Solution (PAS)

     Info

    Overview

    Cloudbric Private Access Solution (PAS) is an agent (Endpoint-Initiated) based Zero Trust Network Access (ZTNA) solution that provides safe and easy application access from anywhere at any time with segmented procedure and flexible access policy that utilizes the Software-Defined Perimeter (SDP) technology.

    Cloudbric PAS secures the network from the inside and prevents the exposure of real server connections by using virtual IPs to protect the network of any organization from external attacks such as DDoS. The public network connections will be communicated via encrypted channels, and enhanced security can be achieved through mutual authentication between the user and the network.

    Under the strict principle of “Secure First, Then Connect,” Cloudbric PAS implements strict multi-step access control for the users and their devices, to prevent any external intrusions, and identity authentication which will allow safe access to applications only to the permitted users.

    As it is risky for every member of the organization to have an equivalent level of access to all data, Cloudbric PAS provides a segmented security perimeter that permits users with as minimum access as needed and a separate security perimeter for each application to protect the sensitive data of the organization.

    The access permissions can be managed conveniently through Cloudbric PAS user console, in which the administrator of the organization will be able to grant the needed permissions to the members of the organization to maintain optimal security level.

    Cloudbric PAS can be deployed on AWS Cloud and construct a ZTNA model to provide strict access policy and protect the assets critical to any organizations.

    Highlights

    • Able to be implemented for not only end users, but also for various environments such as isolated workplace networks or smart factory remote access, protecting the organization's network by concealing important data resources through network solutions designed around user identity.
    • Directly deployed to the cloud environment, reducing installation cost of infrastructure, and convenient installation provided without the need to shut down the company's system for minimized loss of resources.
    • Web-based intuitive user interface provided for the users to conveniently review the security status of the website and apply appropriate measures without any expert knowledge.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    For product-related all inquiries, please contact : awsmkp@pentasecurity.com .

    If you are a buyer based in Japan, and need to request a TQI, please contact: jp-sales@pentasecurity.com .

    Software associated with this service