Application Proxy Networks

CoIP Platform uses the power of advanced network proxy technologies to transparently and rapidly connect hybrid applications, workloads, and services across network silos. With cloaking, micro-segmentation, and powerful application identity-based access controls, enterprises can lock down cloud and on-premises servers with consistent policy controls everywhere.

Register to Download CoIP Whitepaper

skyline connect dots

Key Features

instant-hybrid-connectivity
Instant Hybrid Connectivity
Proxies application traffic at multi-gigabit speeds, without the security risks of a VPN.
secure-by-default (1)
Secure by Default
Whitelist policies automatically block anomalous and unexpected application traffic.
end-to-end encryption
End-to-End Encryption
Encrypted tunnels start and end in the OS, not at the edge; tunnels are set up only when needed to prevent abuse.
overlay-routing (1)
Overlay Routing
Hides the physical IP address of all machines, elegantly resolving problems with overlapping IP spaces.
micro-segmentation
Micro-Segmentation
Filters east-west and north-south traffic based on ports, protocols, and direction, inhibiting lateral migration.
application-interlock
Application Interlock™
Restricts network access to whitelisted applications and blocks rootkits, APTs, and other malware.
smart-discovery
Smart Discovery
Learns application behavior to help automate policy definition in complex data center environments.
logging-for-compliance
Logging for Compliance
Simple to export proxy network configuration for auditing and compliance.

How it Works

CoIP Platform cloaks hosts by blocking traffic on the physical network, re-establishing communication through an overlay application proxy network. Administrators have full visibility and policy control over application behavior in the proxy network. CoIP Platform is completely transparent to applications, setting up end-to-end secure TLS tunnels automatically and tearing them down when no longer needed. CoIP Platform supports nearly any cloud environment, bare metal, or IoT device with agent-based and agentless deployment options.

computer chip security lock

Getting Started with CoIP

With the CoIP Platform in place, companies can...

  • Replace risky VPN connections with on-demand point-to-point application tunnels that are locked to the application
  • Provide third parties with secure access to specific resources within the enterprise
  • Enable cloud servers to access on-prem resources, such as code repositories, without creating inbound connections from the cloud
  • Cloak sensitive applications with micro-segmentation to reduce the attack surface

 

Light Box

 

implementation

Implementation

CoIP Platform is simple to deploy. Completely built out of computing elements and with physical and virtual appliance options, CoIP Platform can be spun up in your data center or in the cloud.

onboarding

Onboarding

CoIP Platform is non-intrusive and can be deployed to a running application server. Once deployed, administrators can build and test policies in the running environment before turning on cloaking and micro-segmentation protections.

operations

Operations

CoIP Platform offers a full suite of diagnostic and monitoring APIs that integrate into your operational flow.

training-services

Training and Services

In addition to our library of resources and training videos, Zentera engineers are available to consult and advise on your design projects.

Stay Connected

Sign up for our newsletter and to be notified of product, solution, and company news.