Safe-T Keeps Your Organization Safe From Attacks And Data Leakage By Securing Your Access

SSupported by cloud service provider DigitalOcean – Try DigitalOcean now and receive a $200 when you create a new account!
Listen to this article

Safe-T Group Ltd. (Nasdaq, TASE: SFET) is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. Below is our recent interview with Shachar Daniel, CEO of Safe-T:

Q: Can you tell us something more about the company and what you do?

A: Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud.

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services.

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats.

At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

Recommended: TapRm Raises $1.5 Million In Seed Funding Led By The Broe Group

Q: What’s the main purpose of Zero Trust Network Access (ZTNA) solution?

A: As the world has become more digital and connected, organizations open their networks and internal applications to the outside (e.g. employees, customers, business partners, 3rd party vendors, mobile devices, IOT devices) much more than in the past.

While this enhanced connectivity provides businesses with incredible opportunities, connectivity comes at a cost; Research shows that six out of ten organizations around the globe have suffered at least one cyber-attack on their enterprise services.

In our technologically sophisticated world, this shouldn’t be the case – but it is, because of the need to expose enterprise services to the world in order to interact with 3rd party vendors and partners. The fact is that organizations are still using old ways of designing perimeter networks (e.g. DMZ segments) and application access (IPSEC and SSL VPNs, RDP, open firewalls) and these legacy methods don’t account for modern connectivity challenges.

It is clear then, that a paradigm shift is needed to overcome the challenges of providing simple, cost effective and transparent access to internet facing services, while effectively combatting cyber-attacks and threats.

Unlike the traditional approach to IT network security, Zero-Trust security means that no one from inside or outside the network is trusted by default, and verification is required from everyone trying to gain access to resources on the network. By implementing this methodology, the organization can guarantee that its’ applications and files are exposed only to those who are really supposed to have access to such data, thus prevent and reduce breaches.

By implementing Zero Trust organizations can now create a “verify-first, access-second” approach across their applications to minimize the attack surface and reduce risk, as well as the complexity and costs associated with the growing need to protect enterprise systems and data.

Q: Which types of businesses can use your solutions?

A: Our solution fits any type of organization as everyone are exposed to cyber-attacks. Naturally, organizations that relay on contractors and third-party vendor and have a large mobile workforce are the ideal customers.

Regulated organizations that aren’t allowed to have anything on cloud can use our solution as we are the only vendor in the market today that offers on-premises implementation.

Recommended: FundamentalVR Raises $5 Million In Series A Funding Round

Q: What are some of the main objectives for Safe-T going into 2020 and how do you plan to achieve them?

A: • Expand our presence in the US market – aggressive lead generation campaigns and activity
• Partnerships – leverage our success story with well-known system integrators to additional OEMs, expand our distribution network
• Increase brand awareness
• Leverage customers slow adoption by disruptive approach “SDPing the VPN” – we’ve recently launched ZoneZero which is designed to work together with the organization’s existing VPN infrastructure, enhancing VPN security by adding SDP capabilities while yielding a more fortified SDP and VPN infrastructure together. Deploying Safe-T ZoneZero allows organizations to easily start a journey towards VPN replacement with SDP.
• Winning features & hybrid approach – we plan on continuing to provide different deployment models to our ZTNA solution to address different customer types. On top of that we continually develop and release new features and capabilities.

,