SAN FRANCISCO--(BUSINESS WIRE)--Aporeto today announced the launch of the first Zero Trust Security solution for the enterprise based on finely-tuned application identity, context and intent. The solution continuously monitors and protects applications, by replacing network security based approaches with a radically simple identity and authorization system.
Aporeto’s security is decoupled from the infrastructure and network; the solution transparently binds to applications to provide them with identity and protect them according to their context and operations intent using end-to-end cryptographic techniques. This approach is underpinned by the “zero trust” principle that assumes that any part of the infrastructure can be compromised at any given time. In contrast, the common approaches of security products are to provide static, infrastructure-dependent protection that must constantly be reconfigured to address application needs.
Enterprise Cloud Data Management leader, Informatica, is using Aporeto as the company continues to deliver and grow its portfolio of data management solutions as cloud services.
“Aporeto is accelerating our expansion to the cloud,” said Alec Chattaway, director of Cloud Infrastructure Operations for Informatica. “We can quickly reduce complexity by removing unnecessary and cumbersome supporting services, while at the same time reducing cost and increasing efficiency, resiliency and security. With Aporeto, we can secure our Linux workloads on any infrastructure with end-to-end encryption and have a path for modernizing with a security layer that is future-proofed.”
According to the Gartner Market Guide for Cloud Workload Protection Platforms, by Neil MacDonald, published March 22, 2017, “cloud-style applications tend to scale elastically, requiring protection to scale up and down on demand with usage-based licensing models that reflect this. Simply running agents designed for on-premises servers and hoping these will work in IaaS is not sufficient.” The report recommends “Security and risk management leaders tasked with acquisition, strategizing and planning should: require vendors to support the visibility and control of workloads that span physical and virtual machines, containers and multiple public cloud IaaS, all from a single policy management framework and console.”
“Network-based security solutions are failing the cloud. Firewalls, overlays, and access control lists are not capable of protecting distributed applications. By focusing on identity and cryptographic techniques, we can decouple security from the infrastructure and make security operations strong, simple and scalable,” said Dimitri Stiliadis, co-founder, and CEO of Aporeto.
Aporeto reduces complexity and strengthens security while tracking the dynamic environment at scale. It binds to any application, on a single or a distributed system, without requiring any network, OS kernel, or code changes. Aporeto protects enterprises’ applications through end-to-end authentication, authorization, and encryption on any cloud environment. By automatically creating contextually rich identity for all services and components, Aporeto offers visibility and exerts fine-grained application control for legacy and modern applications, and protects static, dynamic, or migrating assets on private, public, or hybrid clouds. Aporeto can deliver this solution as a cloud service or as an on-premises installation.
About Aporeto
Aporeto is the Zero Trust Security company that makes applications secure by default based on identity, context, and intent. Its enterprise security solutions are easy to manage and purpose-built for modern, agile distributed systems based on containers, microservices, and serverless architectures as well as legacy applications. Aporeto’s Zero Trust Security solutions work at any scale on public, private or hybrid clouds. For more information, check out www.aporeto.com or www.twitter.com/aporeto.
Note: Informatica is a registered trademark of Informatica in the United States and in jurisdictions throughout the world. All other company and product names may be trade names or trademarks of their respective owners.