Bck placeholder 2x

How Our Software-Defined Perimeter Works

Appgate’s Software-Defined Perimeter architecture exceeds the NIST Zero Trust Architecture Specifications by delivering a truly superior secure access solution.

Watch How Appgate SDP Works

A Step-by-Step SDP Walkthrough

Explore the workflow and core appliances that deliver secure access

Verify
Identity

Before any connection is made, the device and user must authenticate to the Controller, which evaluates a multi-dimensional identity profile.

User and Device Context:

  • User Roles & Projects
  • Time and Date
  • Location
  • Device Security Posture
  • Customizable Conditional Requirements
Software Defined Perimeter Identity 2x

Grant
Entitlements

Based on the context and permissions associated with user or device, the Controller returns a cryptographically signed token back to the Client, which contains the authorized set of network resources.

Entitlements Adjust Based On Conditions and Risk

  • Trusted access
  • Limited access
  • No access
Software Defined Perimeter Entitlements 2x

Permit
Access

The Client uploads the Entitlement, which the Gateway uses to discover applications matching the user’s identity. When the user attempts to access a resource, the network driver forwards the token to the appropriate cloaked Gateway.

The Gateway:

  • Permits access
  • Denies access
  • Requires an additional action from the user, such as a one-time password


Once granted, all access to the resource travels from the Client across a secure, encrypted network tunnel to the Gateway, then through a micro-firewall to the only the approved resource.

Software Defined Perimeter Access 2x

Monitor for
Changes

Appgate’s Software-Defined Perimeter continuously monitors for changes to the user and device context. If context changes, the users' network and application entitlements dynamically adjust in real time based on policies.

Privileges Adjust Immediately:

  • Require additional authentication from the user
  • Restrict access to critical systems
  • Revoke access until resolution
Software Defined Perimeter Dyanmic Access 2x

Explore SDP Further

Related Materials

Talk to a Secure Access Expert

Our team is available to help answer questions about remote access or Zero Trust, demo Appgate SDP solution and discuss pricing. How can we help you deliver secure access with confidence?