Aviatrix Federal

Cloud Requirement - Zero Trust Network Architecture with Aviatrix

Information on multi-cloud networking, cloud network platform, cloud networking, cloud network security, cloud network operations

Issue link: https://aviatrix.com/resources/i/1388585

Contents of this Issue

Navigation

Page 0 of 0

Prevent unchecked lateral network movement from the edge into the cloud premise. R E Q U I R E M E N T: S A L I E N T C H A R A C T E R I S T I C S AV I AT R I X F E D E R A L Federal Sales CONUS & OCONUS [email protected] M E E T I N G T H E R E Q U I R E M E N T | Z E R O T R U S T N E T W O R K A R C H I T E C T U R E Zero Trust architecture is "never trust, always verify", a critical component to enterprise cloud adoption success. A proper zero trust network architecture requires two components: 1) Intelligence at the edge port-of-entry. This is delivered through any leading zero trust provider, such as Zscaler. 2) Intelligent routing, advanced security services, and cyber visbility within the cloud network layer that supports plug & play of zero trust appliances. This is delivered through the Aviatrix cloud network platform. C A PA B I L I T Y: I N T E L L I G E N T C L O U D T R A N S I T S U P P O R T I N G T H E M I S S I O N W I T H Z E R O T R U S T N E T W O R K A R C H I T E C T U R E Capability VMware NSX Cloud Cisco ACI Native Cloud Service Providers (AWS, Azure, GCP, Oracle Cloud) Aviatrix Multi-cloud network segmentation / security domain No No No Yes Edge segmentation Yes Yes Manual Yes Automated routes audit No No No Yes Automated traffic redirection to firewalls No No No Yes Support for all leading zero trust vendors, inc. Zscaler Yes Yes Yes Yes Ability to capture TCP sessions No No S I No Yes Dynamic topology map, network segmentation visualization, detailed flow analytics, latency, and tag-based management No No No Yes SHARED SERVICES TRANSIT SPOKE SPOKE SPOKE BLUE SECURITY DOMAIN TRANSIT ORANGE SECURITY DOMAIN Zero Trust Appliance Zero Trust Appliance Now that applications are moving to the cloud, a new secure perimeter construct must be implemented. Traditional, on-prem solutions are unable to understand the cloud. They lack multi-cloud, multi-account, multi-domain capabilities. With edge connectivity becoming commonplace, users and devices are connecting from everywhere. Connections from the edge must be verified from a user, context, and geo perspective.

Articles in this issue

Links on this page

view archives of Aviatrix Federal - Cloud Requirement - Zero Trust Network Architecture with Aviatrix