• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cyber Security Events 2023-2024
  • Cybersecurity Jobs
  • Sponsored Post
    • Make a Contribution
  • Market Reports
  • About
  • Contact

Elisity Fundamentally Changes Enterprise Security Model with New Security Paradigm Combining Zero Trust Network Access with Software-Defined Perimeter

August 12, 2020 By admin

Elisity, Inc., the pioneer of combined zero-trust networking and software-defined perimeter, emerged from stealth mode today to reveal the details of the company’s modern approach to enterprise data security in a world transformed by cloud, mobility and connected devices. With Elisity Cognitive Trust (ECT)™, the company redefines security and introduces a new security paradigm that combines Zero Trust Network Access and Software-Defined Perimeter where identity is the new perimeter. This approach enables teams to support digital transformation and workforce mobility, reducing costs, simplifying management and delivering powerful secure network security services to customers. The company also today announced its vision for modern security.

The New Era of Network Security for Digital Business

According to Gartner, “Zero Trust Network Access (ZTNA) augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a secure access service edge (SASE) strategy or to rapidly expand remote access.”1 Gartner analysts explain, “The new model — zero trust networking — presents an approach that abstracts and centralizes the access mechanisms, so that the security engineers and staff can be responsible for them. ZTNA starts with a default deny posture of zero trust. It grants access based on the identity of the humans and their devices, plus other attributes and context (such as time/date, geolocation and device posture), and adaptively offers the appropriate trust required at the time. The result is a more resilient environment, with improved flexibility and better monitoring. ZTNA will appeal to organizations looking for more-flexible and responsive ways to connect and collaborate with their digital business ecosystems, remote workers and partners.”2

With its combined Zero Trust Access and a Software-Defined Perimeter with AI, Elisity Cognitive Trust fits the ZTNA model by providing secure digital business transformation and anywhere, anytime access to apps and services. AI is built into Elisity Cognitive Trust and trust is never static — the built-in AI engine monitors flows, tracks and analyzes user behavior and makes access recommendations based on this behavior. It is not just a VPN replacement but rather a platform that helps an organization transition to zero trust across their entire digital footprint including campus, branch, remote access and cloud.

Elisity Cognitive Trust discovers all the organization assets regardless of their digital footprint, it also builds an encrypted e-mesh overlay between the cloud control/policy/AI platform, Cognitive Cloud, and the on prem, virtual private cloud, datacenter server, Cognitive Edge. Any device or app is connected to this mesh only if it is configured with a policy and all the policies are centrally managed in the cloud. Access is never taken for granted and is continuously monitored for risk, health and behavior.

Elisity e-mesh is a software-defined, application-centric virtual network that runs on top of existing IP/MPLS transport network/infrastructure. ECT removes the need for VPN with its data protection and access protection capabilities and decouples application access from underlying network access. The network is inherently assumed to be untrustworthy. Similar to a traditional VPN, services brought within the Elisity environment are no longer visible on the public internet and therefore are shielded from attackers.

“Elisity Cognitive Trust enables digital business transformation scenarios that are ill-suited to legacy access approaches. As a result of digital transformation efforts, most enterprises will have more applications, services, and data outside their enterprises than inside. ECT places the security controls where the users and applications are — in the cloud. Organizations can now connect and secure their access in campus, branch and remote offices to their applications in the cloud, multi-cloud or data center environments,” said Sundher Narayan, Chief Architect at Elisity. “We are bringing significant benefits in user experience, agility, adaptability, and ease of policy management and, for cloud-based Cognitive Edge deployments, scalability and ease of adoption are additional benefits.”

Elisity Cognitive Trust Key Capabilities

Gives you real-time information regarding who is accessing resources and from where
Allows you to nano-segment your environment based on traffic flow and machine identity
Allows you to manage a unified, cognitive, trust-based access policy across your digital footprint
Allows you to securely connect your campus, remote access and branch networks directly to the cloud
Supports the requirements of remote access in a secure way that meets the needs of the customer
Allows you to migrate workloads across clouds or within a VPC in a cloud, securely

What Others are Saying about Elisity Cognitive Trust

“Legacy network security solutions do not address the dynamic secure access requirements of today’s digital businesses,” said Shamus McGillicuddy, vice president of research at Enterprise Management Associates. “Elisity offers a new and modern approach to protecting business-critical applications and data, in the cloud or on-premises. Its technology is designed to stop lateral movement, DDoS attacks, and insider threats.”

“When we think about perimeter today, we have to consider the many aspects of identity. A remote workforce, on many devices and accessing multi-clouds means we have to rethink identity and access and how to authorize access,” said Lee Doyle at Doyle Research. “With the introduction of Elisity Cognitive Trust and the approach with identity as the new perimeter, organizations can better protect their intellectual property.”

“Security is complex, and we are always after the latest, modern approaches to securing our customers’ assets,” said John Cavanaugh, CTO at NetCraftsmen. “We look forward to continuing to evaluate and pilot innovative strategies like Elisity’s new Cognitive Trust solution as companies continue to move to multi-cloud, ongoing remote access, and connected devices.”

Founded in 2018, the company closed a $7.5M seed round of funding that year led by Atlantic Bridge. With its seed round, Elisity has been scaling its engineering, sales and marketing teams to ramp up ahead of the company’s launch. Brian Long, managing partner at Atlantic Bridge; Joe Pinto, chief customer experience officer at Pure Storage; and Ayman Sayed chief executive officer at BMC Software joined Elisity’s board of directors to guide the company through rapid growth.

About Elisity
Elisity is solving the challenge of securing access to enterprise assets and enterprise data in the complex modern world of blurring enterprise boundaries and mobile workforces. Elisity has introduced a unified policy and identity-based access solutions powered by AI. The Elisity team is made up of experienced entrepreneurs with deep technical backgrounds in enterprise networking and security with the world’s largest and most security-conscious organizations. Atlantic Bridge is the lead investor in the company. Advisors include security and networking luminaries, including Greg Akers (former SVP at Cisco), Praveen Akkiraju (Softbank Ventures), Woody Sessoms (former SVP at Cisco), and Jeff Tantsura (Internet Architecture Board). Learn more at www.elisity.com.

1“Market Guide for Zero Trust Network Access,” Published 8 June 2020 and revised 16 June 2020 by Steve Riley, Neil MacDonald and Lawrence Orans

2“Market Guide for Zero Trust Network Access,” Published 8 June 2020 and revised 16 June 2020 by Steve Riley, Neil MacDonald and Lawrence Orans

Filed Under: Cybersecurity Market

Primary Sidebar

Market Analysis

DevOps and Agile: Integrating Development and Operations
China’s Use of Golden Shares: From Reducing State Role to Quietly Controlling Tech Giants
Why Amazon Acquired One Medical: Disrupting the Healthcare Industry with Technology-Enabled Care
The End of an Era: Why China is No Longer Viable as the World’s Factory
Cloudflare’s FedRAMP authorization opens up a huge market opportunity in the US government sector
Datadog’s strong financial results for the fourth quarter and fiscal year 2022 provide a solid case for a Buy recommendation
Cisco: Struggling to find new avenues of growth

Market Research Media

Agile Leadership: Leading Agile Teams for Success
Chinese Brands Reach New Heights of Popularity in the West Amid Growing Political Tensions
Unrestricted Streaming: How VPNs Can Enhance Media Consumption Experience
How the world’s biggest companies have built and defended their moats
Virtual Learning Environments: A Game-Changer in Education?
Streaming video, training, and gaming coming together to form a cohesive and diverse media and entertainment ecosystem
Turn Your Story into a Game: The Art of Gamifying Your Plot

Secondary Sidebar

Technologies

AI Developer
Nvidia’s Lead in AI: Disrupting the Tech Industry
Canva Launches Brand Management Features and AI-Powered Design Tools to Empower Creatives and Professionals
Cloudflare Enters Fraud Detection Market with Cloudflare Fraud Detection
Devices utilizing Wi-Fi HaLow technology are gaining momentum

Venture Capital

African Venture Investment Soars to Record High, Fueled by Tech Startups
Pitchly Secures $7 Million Series A Funding for SaaS-Based Data Enablement Solution
Agile Project Management: Roles and Responsibilities
Candidly, a student debt and savings optimization platform, has raised $20.5 million in a Series B round of financing
GameTech Startups Attracting Venture Capital Funding: The Importance of VPN Security

Footer

Recent Posts

  • Game On: Navigating the Wild World of Gaming Cybersecurity
  • Analyzing VPN Security Vulnerabilities: Risks and Best Practices
  • Infosec & Cybersecurity Congress 2023 UAE, March 28th-29th, 2023, Habtoor Grand Resort, Dubai
  • Boosting Cybersecurity: The Many Ways AI Can Help
  • Darktrace: A Cybersecurity Firm Under Scrutiny by Short Sellers
  • ESG Software: The Future of Sustainable IT Operations
  • Cyber attacks are becoming more frequent and sophisticated
  • The Future of Cybersecurity: 5 Trends to Watch
  • The Importance of Cybersecurity in the Digital Age
  • The next RSA Conference is scheduled to take place from Monday, April 24th to Thursday, April 27th, 2023

S3H

Introduction to Agile Software Development
Understanding Agile Manifesto and Principles
Mastering Agile: A Hands-on Workshop on Agile Software Development
Differences between Agile and Waterfall methodologies
Implementing Agile in Large Organizations

Blockchaining

Global Venture Funding for Blockchain and Crypto Companies Hit Record $26.8B in 2022, But Declined in Later Quarters
Unlocking the Power of Engagement: Exploring the Connection between Gamification and Blockchaining
Building a Decentralized VPN Using Blockchain Technology
Exploring the Latest Innovations in Blockchain and Crypto: A Report from the European Blockchain Convention 2023
Cryptocurrency has become a global phenomenon with a market capitalization of almost $3 trillion at its peak in November 2021

App Coding

Common Pitfalls in Agile Development and How to Avoid Them
How Much Does It Cost to Build a FinTech App?
The annual GameTech Market 2023 is back and better than ever!
Appy Pie Introduces AI App Generator to Expedite App Development Process
Understanding Data Structures and Algorithms

API Coding

Building More Resilient APIs through Negative Testing
API governance is essential for ensuring the secure and reliable use of APIs
How to re-write a legacy API
How to Build API in Next.js
API Hub for Business Allowing Companies to Launch Custom Hubs in Minutes

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT