Kemp’s Zero Trust Gateway fortifies sensitive applications’ security

The new architecture enables granular conditional access for organizations’ proxied applications

Kemp has launched a low-friction Zero Trust Access Gateway (ZTAG) architecture to help organizations implement zero trust policies across their application ecosystems.

“The increase in work-from-home, hybrid cloud, BYOD, and IoT blurs the border between what is on premises and what is beyond the perimeter. This raises new challenges around maintaining compliance and a consistent security posture without detriment to the easy access to services for users,” said Kemp.

Kemp’s zero trust architecture enables secure remote access to load-balanced web applications through a suite of policy-based access control services, including active traffic steering, intelligent content-based routing, and contextual identity validation.

ZTAG also allows for Identity Provider (iDP) integration, so businesses can validate clients’ credentials before granting access to sensitive applications.

Kemp LoadMaster actively directs traffic based on the geographical location of customers and security zone levels of backend services, adding an extra layer of security. Several factors influence service access, including security group membership, source network, and information embedded in HTTP communication.

An embedded web application firewall (WAF) and intrusion prevention system (IPS) on Kemp identifies violations in authenticated client traffic and prevents exploits from taking place.

Organizations can also apply granular restrictions to application and user access depending on clients’ security zones and identities. For instance, a client in security zone A can only read, while those in security zone B may be trusted to execute read and write operations.

Related Resource

Rise to the challenge

Shaping the workplace of the future

Rise to the challengeFree download

Kemp’s other interesting features include multi-factor authentication (MFA), automated configuration and deployment via REST-based policy builder, application reverse proxying, and multi-network service publishing.

"Zero trust is the future of application access and continues to gain traction for customers," said Jason Dover, VP of product strategy at Kemp.

"Kemp is leveraging the privileged position of the load balancer combined with our extensible automation framework to help customers simplify the introduction of a zero trust model into their application ecosystem."

Featured Resources

Modern governance: The how-to guide

Equipping organisations with the right tools for business resilience

Free Download

Cloud operational excellence

Everything you need to know about optimising your cloud operations

Watch now

A buyer’s guide to board management software

Improve your board’s performance

The real world business value of Oracle autonomous data warehouse

Lead with a 417% five-year ROI

Download now

Recommended

UK's first government cyber strategy aims to bolster public sector defences
cyber security

UK's first government cyber strategy aims to bolster public sector defences

25 Jan 2022
IT Pro Podcast: Learning to live with risk
Sponsored

IT Pro Podcast: Learning to live with risk

25 Jan 2022
Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022
How to speed up Windows 11
Microsoft Windows

How to speed up Windows 11

7 Jan 2022