Prevent unchecked lateral network
movement from the edge into the cloud
premise.
R E Q U I R E M E N T:
S A L I E N T C H A R A C T E R I S T I C S
AV I AT R I X F E D E R A L
Federal Sales CONUS & OCONUS
[email protected]
M
E
E
T
I
N
G
T
H
E
R
E
Q
U
I
R
E
M
E
N
T
|
Z
E
R
O
T
R
U
S
T
N
E
T
W
O
R
K
A
R
C
H
I
T
E
C
T
U
R
E
Zero Trust architecture is "never trust, always
verify", a critical component to enterprise cloud
adoption success. A proper zero trust network
architecture requires two components:
1) Intelligence at the edge port-of-entry.
This is delivered through any leading zero trust
provider, such as Zscaler.
2) Intelligent routing, advanced security services,
and cyber visbility within the cloud network layer
that supports plug & play of zero trust appliances.
This is delivered through the Aviatrix cloud network
platform.
C A PA B I L I T Y:
I
N
T
E
L
L
I
G
E
N
T
C
L
O
U
D
T
R
A
N
S
I
T
S
U
P
P
O
R
T
I
N
G
T
H
E
M
I
S
S
I
O
N
W
I
T
H
Z E R O T R U S T N E T W O R K A R C H I T E C T U R E
Capability VMware NSX
Cloud
Cisco ACI Native Cloud Service Providers
(AWS, Azure, GCP, Oracle Cloud)
Aviatrix
Multi-cloud network
segmentation / security
domain
No No No Yes
Edge segmentation Yes Yes Manual Yes
Automated routes audit No No No Yes
Automated traffic redirection
to firewalls
No No No Yes
Support for all leading zero
trust vendors, inc. Zscaler
Yes Yes Yes Yes
Ability to capture TCP
sessions
No No S I No Yes
Dynamic topology map,
network segmentation
visualization, detailed flow
analytics, latency, and
tag-based management
No No No Yes
SHARED SERVICES
TRANSIT
SPOKE SPOKE
SPOKE
BLUE SECURITY
DOMAIN
TRANSIT
ORANGE SECURITY
DOMAIN
Zero Trust
Appliance
Zero Trust
Appliance
Now that applications are moving to the cloud,
a new secure perimeter construct must be
implemented. Traditional, on-prem solutions
are unable to understand the cloud. They
lack multi-cloud, multi-account, multi-domain
capabilities.
With edge connectivity becoming
commonplace, users and devices are
connecting from everywhere. Connections from
the edge must be verified from a user, context,
and geo perspective.