What is Secure Access Service?
Safous Zero Trust Access/ZTA, a secure access service allows you to safely and securely access important corporate resources anytime, from anywhere. The advanced authentication and authorization function helps you achieve optimal access control.
Supervised Access and Session Recording Functions
It has a supervisor function and a session recording function that are effective for third-party access management.
If the supervisor function is set for an individual user, when the user tries to log in, the login will not be allowed until the supervisor approves it. The user must wait in the waiting room until approved. After the user logs in, the supervisor can directly see the user's console by pressing the "Supervise" button. By using this function, supervisors can check the login status of a user who has a strong privilege (such as super admin) and the activities in real time. Moreover, supervisors can interrupt into the sessions, so that third-party access can be watched. Additionally, you can record the entire session.
Browser Isolation Function
Safous Browser Isolation Function will provide a sandbox-type virtual browser on one of Safous’ access points. (PoP: Point of Presence) Establishing access through this virtual browser will allow users to navigate the web without risking their devices.
This is made possible through Safous’ ability to completely separate the end device from the Web. By doing so, even in the case, there are vulnerabilities on the device, attackers will not be able to intrude and exploit it. Safous’s Browser Isolation can be utilized for Data Loss Prevention(DLP) as well. By restricting file uploads and downloads, users can restrict which confidential information can be uploaded to the public, allowing organizations to better protect their resources.
Application Gateway Specification
Safous will provide an application gateway software to be installed on a server in the customer's environment. The server specifications required for building an application gateway are as follows.
Here are some application examples of services that leverage the strengths of zero trust network access.