Third Party Access Smarter Access Smarter Security Enabling secure application access for partners, contractors and consultants THE PROBLEM Enterprises have traditionally used a combination of perimeter security devices to protect and broker access to internal resources. This perimeter security model, often referred to as “Defense-in-Depth”, offers layered protection. A popular metaphor is the medieval castle with its heavily fortified main gate, tall thick border walls, all surrounded by a moat. Beyond the moat, everything is considered dangerous; inside the castle walls everything is considered safe. Over the last 25+ years, enterprises have largely followed this same model. If a user was on the company LAN, they were considered trusted, and therefore safe. If they were outside the network, there were considered dangerous, even in the case of remote corporate users. Today, things are changing. Organizations are increasingly augmenting, or abandoning, their LANs and WANs in favor of using the Internet as their ‘network’. Applications that once exclusively resided behind the firewall in the data center are migrating to the cloud. Further, our new ‘sharing’ economy is driving organizations to share applications and data with customers, suppliers and contractors (third parties) as part of the new normal. To enable third party access to internal applications, organizations traditionally relied on virtual private networks (VPNs) for providing remote access to both trusted and untrusted users. However, VPNs have a number of shortcomings: • Data Breach Risk: Once connected via VPN, users often have carte blanche access to a vast array of resources and services, Contactnetwork us: versus just the applications 520 LAKESIDE DRIVE, SUNNYVALE, CA they 94085are| authorized to use. • Cost: CapEx associated with To enable third party access to internal applications, organizations traditionally rely on virtual private networks (VPNs) for providing remote access to both trusted and untrusted users. However, VPNs have a number of shortcomings: • Data Breach Risk: Once connected via VPN, users often have carte blanche access to a vast array of network resources and services, versus just the applications they are authorized to use. • Cost: CapEx associated with acquiring, deploying, managing and maintaining VPN hardware is significant. • Complexity: Every additional VPN requires management, configuration, a change to the firewall rules and other controls. • Reliability: Slow connections and unacceptable latency make using VPNs undesirable and negatively impact productivity. 408.773.6236 | WWW.SOHA.IO THE SOHA SOLUTION Soha has a radically new approach for third party access to internal applications that is more secure, simpler to deploy, and lower cost than existing solutions. • More Secure: Soha Cloud enables access to only the applications a user is authorized to use, versus wider network access typically enabled by VPNs. • Simpler to Deploy: No network configuration changes, no whitelists, and no security groups; in fact no changes of any kind are required. Initial installation takes less than 15 minutes. • Lower Cost: With no hardware to acquire, and no software clients to manage, Soha Cloud is IT budget friendly. Last, but not least, Soha Cloud offers a great user experience. Just enter a user name and password into a browser from any device, anywhere to be seamlessly – yet securely connected to applications in the cloud or behind the firewall.
© Copyright 2026 Paperzz