The Covid-19 pandemic has compelled organizations to allow large sections of the workforce to work from home. A majority of enterprises have deployed a VPN to provide remote access and ensure business continuity. However, traditional VPNs were never designed for today's highly distributed and hybrid IT environments and could expose enterprise applications and sensitive data on the corporate network to malware, ransomware, and other cyberattacks. Learn how Block Armour's #ZeroTrust security solution with integrated 2-factor authentication mitigates the risk of unauthorized access, prevents malware propagation and enables secure and compliant remote access for employees working from home due to Covid-19.
Solution: Block Armour Secure Remote Access for WFH
1. w w w . b l o c k a r m o u r. c o m
1
Comprehensive Zero Trust security solution to enable secure
and compliant remote access for employees working from home
Accelerated by Airbus
Listed among the Top 20 global cyber
security startups - 2017,18,19
Featured as one of the Top 25
cybersecurity innovations by Accenture
2. w w w . b l o c k a r m o u r. c o m
2
The Challenge: Legacy tools
like VPNs are simply unable
to address, the secure remote
access needs of enterprises
in today’s day and age
Aug 2020, a hacker published a list of usernames and
passwords, along with IP addresses for more than 900
enterprise servers belonging to a VPN provider
According to a report from vpnMentor earlier in 2020,
seven VPN providers in total leaked 1.2TB of personal user
data
In 2019, a leading VPN provider confirmed it was hacked
after one of the data centres where they rented servers
from was compromised
The rapid adoption of Cloud technology and employees working from home
due to Covid-19 has resulted in highly distributed and hybrid IT ecosystems
3. w w w . b l o c k a r m o u r. c o m
3
Modern approaches like Zero Trust are swiftly becoming the preferred security
paradigm for today's contemporary digital enterprise
Authenticate not just
the user but also the
device
Grant precise
network/application
access
Single trust level for
access from within and
outside the perimeter
According to Gartner by 2022, 80% of new digital business applications will be accessed through zero trust network access
(ZTNA), and 60% of enterprises will phase out their remote access virtual private networks (VPN) in favor of ZTNA
Logging and monitoring
of network traffic for
continuous visibility
Micro-segmentation to
secure access & prevent
lateral movement
4. w w w . b l o c k a r m o u r. c o m
4
The solution allows organizations to quickly enable teams of remote
workers without sacrificing security or productivity
A single platform to enable secure remote
access to multiple servers/applications
Quick deployment for reduced impact
on operational performance
One single instance for all systems;
whether on-premise and in the Cloud
Prevents Ransomware/Malware
propagation to the corporate network
Integrated 2FA stops remote access
from unauthorized devices
KEY BENEFITS
101010
101001
011100
Block Armour offers an enterprise-grade Zero Trust solution to enable secure
and compliant access to IT systems for employees working from home
5. w w w . b l o c k a r m o u r. c o m
5
The Building Blocks: The solution is powered by Software Defined
Perimeter (SDP) architecture & Blockchain technology
SDP architecture renders cloud and critical information systems invisible to attackers; and customized agents along with
private Blockchain technology delivers a new breed of digital identity and access control for all users and user devices
Software Defined Perimeter (SDP)
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD
All communication between devices and control systems is secured using 4096 bit RSA encryption
Blockchain
Technology
Decentralization
Cryptographic Encryption
Immutability
Consensus-based Control
SDP
Controller
Accepting SDP
Host
Accepting SDP
Host
Initiating SDP
Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication from
Initiating Host
2. Mutual secure comm. to
Controller
Control Channel
Data Channel
6. Receive list of IP’s of
Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
6. w w w . b l o c k a r m o u r. c o m
6
The Architecture: Unlike point products, Block Armour’s Secure Shield
architecture delivers Zero Trust security in a holistic manner
On-prem
Cloud
Invisible Systems
Secure Shield Controller
- Block Armour Agent
Authenticate
User & Device
Mutual Authentication
to establish Trust
Precise Encrypted Dynamic Network Access
User Device
CUSTOM APPS
Application White-Listing
… offering a single integrated platform to secure systems on-premise and in the Cloud as well as connected IoT devices
7. w w w . b l o c k a r m o u r. c o m
7
Block Armour is officially recommended by the Ministry of Electronics and
Information Technology, Govt. of India and the Data Security Council of India
8. w w w . b l o c k a r m o u r. c o m
8
We have forged strong relationships with organizations who are aligned with
our vision of a secure and compliant digital future
Folks we work closely with:
9. w w w . b l o c k a r m o u r. c o m
9
The Result: A Zero Trust security solution that empowers Cloud adoption and
provides secure and compliant remote access for employees working from home
Seamless secure access
for authorized remote /
third-party users
Precise network /
application access
based on policy / rules
1 application to secure
on-premise and Azure
Cloud based systems
The solution is easy to implement, can be deployed remotely and requires minimal changes to the existing enterprise-IT environment
Logging and monitoring
of network traffic for
continuous visibility
Integrated 2-factor
authentication for
enhanced security
10. w w w . b l o c k a r m o u r. c o m
10
Join us as we enable enterprises to
make the shift to Zero Trust security
and adapt to a fast-changing world
Drop us a line or reach us via any of the channels below:
Reach Us
+65 96536243
+91 9820386446
@blockarmour
info@blockarmour.com
www.blockarmour.com