WHY YOU NEED CLOUDENTITY.
APIs are running wild with 80% of datacenter traffic taking place within the datacenter (East/West) and it’s largely unprotected. Cloudentity allows you to include the latest security measures for ALL traffic providing authentication and authorization for EVERY service, User and Thing.
Tame your API Wildlife
APIs are running wild and that means that when a hacker makes it into your network they can jump across systems with little to no friction and extract data as they go. Cloudentity’s fine-grained security policies supporting authentication and authorization securing traffic originating from all services, users, and devices down to the microservice level.
Classic Security is not Stopping Data Loss
Classic security devices are too far from the application layer to secure APIs in real time. The Cloudentity MicroPerimeter™ allows you to establish rules and policies for individual services or a small set of containerized services. Allowing only authorized connections and denying everything else in a simple and scalable manner. Protecting the datacenter from the inside out.
The claim of Zero Trust being made today refers to authentication and authorization for users and devices, yet services are equally important. Cloudentity offers the world’s only solution that supports authentication, authorization and a complete audit trail for everything and EVERY transaction. It’s the first adaptive engine for all services, users and things.
WHAT DOES CLOUDENTITY DO?
Through a Zero Trust approach Cloudentity ensures that the right people, services, and things have the right access to the right resources in the right ways. With Cloudentity, you also have the ability to prove all those “rights” to the people who need to know.
Unified Security Policy
Cloudentity allows you to execute a unified security strategy from the first step of software development, integrating seamlessly with your CI/CD deployment strategies, while supporting legacy infrastructure and even SaaS based third party systems.
Dynamic authorization is available for every transaction, from the initial User authentication to every application to application transaction, while maintaining user context. Providing security and visibility to the inter-service transactions that make up 80% of transactions today.
TrUST Authorization Engine™
The TrUST Authorization Engine™ measures real-time transactional risk between services, users, and devices. The solution can assess and evaluate risk on a transactional basis and provide dynamic authorization flows to mitigate the risk.
Each transaction creates a comprehensive digitally signed audit trail from authentication to data access via unique individual transaction IDs and verified claims available to applications, microservices, APIs, containers and server-less functions for frictionless fulfillment of governance and compliance requirements.
The MicroPerimeter™ provides fine-grained security policies supporting authentication and authorization for traffic originating from all services, users and devices. It can be used for individual services in the cloud or a hybrid environment.
Unlike Anything Else
Unlike a centralized API gateway, the MicroPerimeter™ protects one microservice or small domain of microservices.
The MicroPerimeter™ has a pluggable architecture that enables each incoming request and outgoing response to be subject to custom transformation performed by configurable plugins.
The MicroPerimeter™ handles utility security requirements such as…Strong Authentication of services and users, Dynamic Coarse and Fine-Grained Authorization, OAuth, SAML, OIDC, Transaction Throttling, TLS, and Secret Off-Load, Brute-force Protection, Service Discovery, Service Configuration and more.
Powerful yet Modest
The MicroPerimeter™ is scalable and won’t cause code bloat. Its tiny size allows it to be deployed with every service instance or used as a sidecar.
Cloudentity was created to protect your cloud-native applications and all our services come prebuilt, pretested, and security reviewed.
Check out all our products to see what we can do for your company.
BUILD ON WHAT YOU HAVE
A major advantage of Cloudentity’s microservice architecture is how well it can work with security and identity platforms already in use.
Most security and identity platforms are largely still monoliths themselves preventing them from participating effectively in microservice environments. Despite that, it may not be optimal to have users establish a new identity or to change to a new authentication workflow.
With Cloudentity organizations are able to choose what microservices they need. If only the MicroPerimeter™ is needed to offload transactional security through authentication and authorization yet there is an existing identity platform to leverage for user management that can be done.
We recognize that cloud-first security spans multiple domains. That’s why Cloudentity integrates with a wide variety of security and identity technologies and has formed partnerships with major industry leaders.