SASE Overlay

CoIP Access Platform supports enterprises to build a cybersecurity mesh across remote infrastructure environments without having to stitch together distributed network edges for implementing network security.

CoIP Access Platform authenticates applications, workloads, users, and services that are deployed across distributed network silos, and securely connects them using a SASE overlay. With security functions inserted along the path, such as L4-7 firewalls, micro-segmentation and cloaking, and powerful application identity-based access controls for ZTNA, enterprises can lock down cloud and on-premises servers with consistent policy controls everywhere.

Learn about CoIP SASE Overlay >

sase overlay

Key Features

password
CoIP Launcher
Agentless secure user access with strong Zero Trust authentication for remote employees, contractors, and 3rd parties, supporting both web apps and standard TCP/IP apps
smart-discovery
CoIP XDRi
Rich analytics augmenting XDR, enabling user information, endpoint and software process fingerprints, and network behavior to be correlated against corporate policies and security threat information, and built-in security controls for response and remediation
end-to-end encryption
CoIP AppLink
End-to-end, application-specific encrypted link that starts and ends in the endpoint OS, and dynamically set up, driven by policy-approved traffic, for a minimal attack surface
product-4
File Transfer Manager
Secure file transfers across distributed network silos with complete audit trails and workflows for approvals that help protect against data leaks

How It Works

CoIP Access Platform authenticates users, endpoints, and applications, using corporate identity providers, certificates, and other device/app fingerprints.

When a user or application requests access, CoIP Access Platform checks policy, sets up a CoIP AppLink tunnel for authorized connections if required, and inserts required security functions  inline, such as firewall and threat detection/prevention.

 CoIP Access Platform supports nearly any cloud environment, bare metal, or IoT device with agent-based, agentless, and gatekeeper deployment options, and deploys in existing environments without requiring network and security infrastructure changes.

CoIP Access Platform provides administrators with complete visibility into user, endpoint, and application end-to-end behavior.  It provides a rich source of data and intelligence for XDR analytics, as well as control over the cyber kill chain for response and remediation.

computer chip security lock

 

sketch

Planning for your CoIP Access Platform deployment


  1. Learn about the Architecture and Components

  2. Review our video and whitepaper resources

  3. Review our additional design support resources and tools

  4. Get CoIP Access Platform:

    Find CoIP Access Platform on AWS >

    Get Zentera Air >

  5. Contact us for questions and support


implementation

Implementation

CoIP Access Platform is simple to deploy. Completely built out of computing elements and with physical and virtual appliance options, CoIP Platform can be spun up in your data center or in the cloud.

onboarding

Onboarding

CoIP Access Platform is non-intrusive and can be deployed to a running application server without requiring a restart. Once deployed, administrators can build and test policies in the running environment before turning on security protections.

operations

Operations

CoIP Access Platform offers a full suite of diagnostic and monitoring APIs that integrate into your operational flow, and rich CoIP XDRi data can be exported to a SIEM, such as Splunk or ELK, for further processing.

training-services

Training and Services

In addition to our library of resources and training videos, Zentera's experienced engineers and architects are available to provide training, architecture guidance, and to advise operational best practices for your projects.

Stay Connected

Sign up for our newsletter and to be notified of product, solution, and company news.