Third Party Access - Enterprise Application Access

Third Party Access
Smarter Access
Smarter Security
Enabling secure application access for partners, contractors and consultants
THE PROBLEM
Enterprises have traditionally used a
combination of perimeter security devices to
protect and broker access to internal
resources. This perimeter security model,
often referred to as “Defense-in-Depth”, offers
layered protection. A popular metaphor is the
medieval castle with its heavily fortified main
gate, tall thick border walls, all surrounded by
a moat. Beyond the moat, everything is
considered dangerous; inside the castle walls
everything is considered safe.
Over the last 25+ years, enterprises have
largely followed this same model. If a user
was on the company LAN, they were
considered trusted, and therefore safe. If they
were outside the network, there were
considered dangerous, even in the case of
remote corporate users.
Today, things are changing. Organizations
are increasingly augmenting, or abandoning,
their LANs and WANs in favor of using the
Internet as their ‘network’. Applications that
once exclusively resided behind the firewall in
the data center are migrating to the cloud.
Further, our new ‘sharing’ economy is driving
organizations to share applications and data
with customers, suppliers and contractors
(third parties) as part of the new normal.
To enable third party access to internal
applications, organizations traditionally relied
on virtual private networks (VPNs) for
providing remote access to both trusted and
untrusted users. However, VPNs have a
number of shortcomings:
• Data Breach Risk: Once connected
via VPN, users often have carte
blanche access to a vast array of
resources and services,
Contactnetwork
us:
versus
just the
applications
520 LAKESIDE
DRIVE,
SUNNYVALE,
CA they
94085are|
authorized to use.
• Cost: CapEx associated with
To enable third party access to internal
applications, organizations traditionally rely
on virtual private networks (VPNs) for
providing remote access to both trusted and
untrusted users. However, VPNs have a
number of shortcomings:
• Data Breach Risk: Once connected via
VPN, users often have carte blanche
access to a vast array of network resources
and services, versus just the applications
they are authorized to use.
• Cost: CapEx associated with acquiring,
deploying, managing and maintaining VPN
hardware is significant.
• Complexity: Every additional VPN
requires management, configuration, a
change to the firewall rules and other
controls.
• Reliability: Slow connections and
unacceptable latency make using VPNs
undesirable and negatively impact
productivity.
408.773.6236
|
WWW.SOHA.IO
THE SOHA SOLUTION
Soha has a radically new approach for
third party access to internal applications
that is more secure, simpler to deploy,
and lower cost than existing solutions.
• More Secure: Soha Cloud enables
access to only the applications a user is
authorized to use, versus wider network
access typically enabled by VPNs.
• Simpler to Deploy: No network
configuration changes, no whitelists,
and no security groups; in fact no
changes of any kind are required. Initial
installation takes less than 15 minutes.
• Lower Cost: With no hardware to
acquire, and no software clients to
manage, Soha Cloud is IT budget
friendly.
Last, but not least, Soha Cloud offers
a great user experience. Just enter a user
name and password into a browser from
any device, anywhere to be seamlessly –
yet securely connected to applications in
the cloud or behind the firewall.