ZafePass VPC

ZafePass VPC - Virtual Private Connectivity is the foundation in the ZafePass technology and will connect anhy entitled user to their entitled resources. Nothing else, than what your IT-Admins configure should be presented as menu items within ZafePass - and how this resource should be presented and for how long etc.

Any user can connect easily from anywhere to any IT resource, service, application or data - completely immune to cyber-criminal activity. 

ZafePass for Enterprise

ZafePass for Enterprise is based on ZafePass VPC functionality added a Security Policy and Administration for automatically deciding en enforcing verification based on Zero-Trust principles (never trust - always verify). This means a user connecing from unauthorized & non-verified devices, will automatically be required to verify themselves via 2FA or 3FA. The security policies variations are multiple  - do A if User1 is logging in from X country,  do B if User1 is logging in from Y country - do C if User1 users a known device from country X - do D if User is using an unknown device from country X etc.

It takes hours to install ZafePass - with simple OoTB Security Policies - it's a rolling but simple process to keep policies up-to-date based on the threats your organisation are facing.

ZafePass for Service Providers

ZafePass for Service Providers are based on either ZafePass VPC or ZafePass for Enterprise - added multi-tenancy for servicing especially the Small-Medium-Businesses. The shared Security Responsibility is no longer in action as the Service Provider can offer a FULLY MANAGED Security-as-a-Service. Help your clients tune functionality elements, client branding, security policy and you can on-/off-board resources, add users - configure new services, provision new clients in minutes via the Admin-console.

It takes hours (maybe a day or two - not weeks and not months) to install and configure ZafePass - and you can recommend your clients to start with simple, yet effective Security Policies, and slowly help them get more advanced - from group based to individual - from 5 policies to 50 etc. Build a service around helping your clients stay up to date on threats and the security policy adjustments - and you can always get help from our professional services team.

An Enterprise using ZafePass will have superior M&A or Divistiture advantages. First of all, using ZafePass in the first place have significant lower cost of IT operational benefits, second the IT-team are in control. 

The acquired organisation use legacy infrastructure setup with perimeter and network based access - and user connect from externally via VPNs. VPN is not designed for continous use, which means mobile travellers face contstant issues connecting. VPNs doesn't scale well, are complex to configure and operate, and require a lot of user support. On top VPNs lack granular security, has unpredictable performance and unrealiable availability (travellers).

ZafePass (and other SDP based solutions) are offering the 180-degree opporsite. 

The IT-integration of two companies can become a lot less comples using ZafePass. By installing a ZafePass Gateway (or several) within the acquired IT-infrastructure and synchronize with their user-directory (most likely MS Active Directory) you can now copy the setup from the mother organisation and adjust the settings for application capture and link these with the appropriate users. It takes less than a day to provide users access to the mother-organisation applications you wish your new users should have access to and the same apply to the users from the mother organisation that should have access to the applications within the acquired organisation.

The result: the IT-teams can concentrate and has the time to integrate the backend systems properly.

ZafePass for M&A and Divestitures

It's not just the cost of each and every solution and the cost of professional workforce proficient managing every part, but also the cost of consolidating monitoring, on-/off-boarding users locationsand services, the cost of integrating each solution into orchestrated procedures. It has massive implications on productivity and profits.

Enforcing uniformly granular policies and handling events in a "Frankenstack"-heterogeneous environment, is close to impossible. Inevitably organisations with such environments, reach a point where the security policies are not enforced properly, opening IT resources to the risk of attacks and data loss. That's what you face today; a very high Cyber crime exposure.

Users gets confused when different solutions have different functionality - and wonder why they can access certain IT resources and perform certain operations from one location or device, but cannot do it from another. There's a lack of parity between the capabilities of different access solutions used for different scenarios - which leads to loss of productivity.

Every change in the datacentre network topologies, the on-/offboarding of users, services, applications etc., would have to take place in multiple system, resulting in lower agility and flexibility of the whole architecture. It impacts IT-staff productivity and hinder the business strategy and goals to be fulfilled, as well s the abilty to compete with industry peers.