Security

Software Defined Perimeter (SDP)

A major concern facing CIOs today is that more employees and contractors are working from home. How can IT provide a secure connection to authorized enterprise applications without providing access to unauthorized applications and the network infrastructure itself? And, how can IT provide access that is transparent to the users? 

Verizon Software Defined Perimeter (SDP) is the zero-trust approach to networking for remote access, internal networks, and cloud applications. It can defeat network based attacks from unauthorized users and devices. It is fast and user-friendly, and it can be used standalone, or combined with Verizon’s Private IP or SD-WAN services to create trusted networks. Additionally, SDP can provide secure remote access to authorized applications without making the network accessible, and it does it with multi-factor authentication that is transparent to users. 

Theory of Operation

Verizon SDP sits between users and servers, and isolates servers to defeat exploits such as attacks on vulnerabilities and configuration errors. It applies multi-factor authentication to defeat credential theft while not requiring the user to continuously re-enter their passwords or multifactor authentication tokens. And it encrypts all traffic to defeat man-in-the-middle attacks. 

Architecture

Verizon SDP consists of three main components:

  • ·        Controllers
  • ·        Gateways
  • ·        Clients
  •  

Together, they help defeat unauthorized users and devices attempting to access protected applications. The figure below shows the protected applications on the right. These include: software-as-a-service (SaaS) applications; those hosted in infrastructure-as-a-Service (IaaS) or in hosting centers; applications on the DMZ; and, applications in the data center. 

A major concern facing CIOs today is that more employees and contractors are working from home. How can IT provide a secure connection to authorized enterprise applications without providing access to unauthorized applications and the network infrastructure itself? And, how can IT provide access that is transparent to the users? 

Verizon Software Defined Perimeter (SDP) is the zero-trust approach to networking for remote access, internal networks, and cloud applications. It can defeat network based attacks from unauthorized users and devices. It is fast and user-friendly, and it can be used standalone, or combined with Verizon’s Private IP or SD-WAN services to create trusted networks. Additionally, SDP can provide secure remote access to authorized applications without making the network accessible, and it does it with multi-factor authentication that is transparent to users. 

Theory of Operation

Verizon SDP sits between users and servers, and isolates servers to defeat exploits such as attacks on vulnerabilities and configuration errors. It applies multi-factor authentication to defeat credential theft while not requiring the user to continuously re-enter their passwords or multifactor authentication tokens. And it encrypts all traffic to defeat man-in-the-middle attacks. 

Architecture

Verizon SDP consists of three main components:

  • ·        Controllers
  • ·        Gateways
  • ·        Clients
  •  

Together, they help defeat unauthorized users and devices attempting to access protected applications. The figure below shows the protected applications on the right. These include: software-as-a-service (SaaS) applications; those hosted in infrastructure-as-a-Service (IaaS) or in hosting centers; applications on the DMZ; and, applications in the data center. 

Features & Benefits

Software Defined Perimeter is the Zero-Trust approach to networking because it isolates the servers to defeat server exploitation, then, implements multifactor authentication to defeat credential theft, and, finally, builds end-to-end encrypted tunnels with the strongest crypto algorithm  commercially available to defeat man-in-the-middle attacks.

Core Features: 

  • Zero Trust 
  • ·        Lightweight physical or virtual network sensors are deployed in customer networks or in the cloud. These sensors are near real-time, highly configurable network-recording appliances that enable users to collect, filter, and analyze full network traffic - metadata and PCAP.
  • Ease of Installation,
  • ·        The NDR platform includes subscriptions for threat intelligence feeds and intrusion detection signatures, and it correlates all alerts.
  • Fast Performance.
  • ·        Customer gets full access to visualize their data, via web-based user interface (Visualizer). The Visualizer enables customers to view reports, manage users and policies, view and analyze threats, download packets, and receive notifications of any threat perceived in the network.  
  • Key Benefits
  • ·        Server isolation defeats exploitation attacks
  • ·        Transparent Multi-factor Authentication (MFA) defeats credential theft
  • ·        Mutual TLS defeats man-in-the-middle attacks 
  • ·        Trust assessment defeats compromised clients

Software Defined Perimeter is the Zero-Trust approach to networking because it isolates the servers to defeat server exploitation, then, implements multifactor authentication to defeat credential theft, and, finally, builds end-to-end encrypted tunnels with the strongest crypto algorithm  commercially available to defeat man-in-the-middle attacks.

Core Features: 

  • Zero Trust 
  • ·        Lightweight physical or virtual network sensors are deployed in customer networks or in the cloud. These sensors are near real-time, highly configurable network-recording appliances that enable users to collect, filter, and analyze full network traffic - metadata and PCAP.
  • Ease of Installation,
  • ·        The NDR platform includes subscriptions for threat intelligence feeds and intrusion detection signatures, and it correlates all alerts.
  • Fast Performance.
  • ·        Customer gets full access to visualize their data, via web-based user interface (Visualizer). The Visualizer enables customers to view reports, manage users and policies, view and analyze threats, download packets, and receive notifications of any threat perceived in the network.  
  • Key Benefits
  • ·        Server isolation defeats exploitation attacks
  • ·        Transparent Multi-factor Authentication (MFA) defeats credential theft
  • ·        Mutual TLS defeats man-in-the-middle attacks 
  • ·        Trust assessment defeats compromised clients

The Verizon Advantage.

We bring a lot to the table. As a wholesale service provider, Verizon Partner Solutions provides voice, data and internet solutions through our global Private IP network in more than 150 countries. We deliver high capacity and fast performance through standards-based 100 Gigabit Ethernet on our IP backbone network, and have more than 81 IP Nodes across 60 U.S. Cities.

Your customers can benefit from a diverse portfolio of world-class networking solutions. Whether you’re a carrier, local provider, ISP, aggregator, reseller or content provider, we can help you deliver seamless and innovative local and global networking. Help your customers take advantage of our Data Networking, Access and Ethernet, Internet Access, IP Data, Optical Ring, Security, Voice and many more solutions. We’ve honed our strong Service Level Agreements (SLAs), technical expertise and customizable services to help you—our wholesale partners—deliver on your unique business goals.

We bring a lot to the table. As a wholesale service provider, Verizon Partner Solutions provides voice, data and internet solutions through our global Private IP network in more than 150 countries. We deliver high capacity and fast performance through standards-based 100 Gigabit Ethernet on our IP backbone network, and have more than 81 IP Nodes across 60 U.S. Cities.

Your customers can benefit from a diverse portfolio of world-class networking solutions. Whether you’re a carrier, local provider, ISP, aggregator, reseller or content provider, we can help you deliver seamless and innovative local and global networking. Help your customers take advantage of our Data Networking, Access and Ethernet, Internet Access, IP Data, Optical Ring, Security, Voice and many more solutions. We’ve honed our strong Service Level Agreements (SLAs), technical expertise and customizable services to help you—our wholesale partners—deliver on your unique business goals.

Talk to a Verizon Account Manager today.

We specialize in helping wholesale carriers, resellers and third-party agents of all sizes  take on their customer’s biggest challenges. Let’s talk about your
customers and how our services and technology can help you transform their operations so they can achieve better business outcomes.

Click here >

We specialize in helping wholesale carriers, resellers and third-party agents of all sizes  take on their customer’s biggest challenges. Let’s talk about your
customers and how our services and technology can help you transform their operations so they can achieve better business outcomes.

Click here >

Pricing

    Please contact us or your Account Manager for pricing. 

    Please contact us or your Account Manager for pricing.