Ericom Application Isolator
Photo Gallery
Ericom Application Isolator
Additional Info
Company | Ericom Software |
Website | http://www.ericom.com |
Company size (employees) | 100 to 499 |
Overview
Ericom extended its innovative Zero Trust security portfolio in August 2020 when it introduced Ericom Application Isolator, a simple, cost-effective way to add powerful identity-based micro-segmentation/ZTNA (Zero Trust Network Access) security controls to existing VPNs and networks. It bolsters a company’s defenses by limiting both remote (North-South) and internal (East-West) application and resource access to only what is truly required for users to be productive. This eliminates the issue of over-privileged access, which is a significant vulnerability most organizations face. Its granular micro-segmentation controls also completely cloak applications from unauthorized users, isolating them from both external and internal attacks. By eliminating lateral movement within the network, it stops the spread of pervasive threats like ransomware.
In response to COVID-19 office closures in 2020, most organizations doubled down on the use of VPNs to quickly enable home-based work environments for their new remote workers. Unfortunately, this increase in remote workers, and their reliance on vulnerable VPNs, increased their organization’s exposure to the surge in cybercrime that the market has experienced. As a result, organizations depending on VPNs to stay connected and productive needed a way to “retrofit” their VPNs with additional security controls.
Ericom took a unique approach with Ericom Application Isolator, designing it to be a lightweight, simple to deploy and use, complement to VPNs, as opposed to a replacement to VPNs. This approach makes the security solution much more cost-effective for organizations. More importantly, Ericom offered the Standard Edition of the solution free for IT teams to download, deploy, and use. The software’s Standard Edition is free and can be downloaded from Ericom’s website, here: https://www.ericom.com/ericom-application-isolator/
By giving their VPNs a “Zero Trust Security Boost” with Ericom Application Isolator’s identity-based micro-segmentation capabilities, organizations can confidently rely on their remote access infrastructure to keep their users connected, productive, and secure.
How we are different
Based on Zero Trust principles of “trust nothing, verify everything” and least-privilege access, Ericom Application Isolators delivers Zero Trust Network Access (ZTNA) controls and microsegmented access to existing VPNs and corporate networks. A free Standard Edition is available from Ericom’s website.
Key differentiations include:
· Application/Resource Cloaking - makes corporate applications and resources invisible to users who don’t have proper permissions by “cloaking” their DNS and IP port information. Users connect to the network as usual, either while at the office or remotely using their VPN client, and Ericom Application Isolator enforces least-privilege access policies. Authenticated users with valid permissions have no change in their user experience. Additionally, IT professionals have visibility into application and resource access and use.
· Automatic Access Policy Creation - simplifies the process of establishing per-user remote (North-South) and internal (East-West) microsegmented access policies. The solution's patent-pending Auto-Policy Manager uses machine learning to automatically generates per-user (or group) access policies based on network traffic analysis over a configurable time period. Manual adjustments can be applied as needed to quickly define and deploy least-privileged access policies for the entire organization. This capability takes the pain out of the most challenging part of microsegmentation programs and eliminates the “excessive access” vulnerability that exists in most of today’s flat network designs.
· Integrations with Leading VPNs and NGFWs - leverages an organization's existing investments in VPNs and NGFWs to accelerate their move to microsegmentation-based Zero Trust Security. The solution can be deployed quickly, does not require new agents to be installed, and operates with the gateways and VPN clients of leading vendors, including Check Point, Forcepoint, Cisco, Fortinet, OpenVPN, and more. The software also integrates with Microsoft Active Directory to authenticate and authorize users while they are in corporate offices accessing internal resources.