Acreto SASE+Plus

One Security for Everything

End-to-end, Zero-Trust security to protect anything, anywhere. One security from one provider to protect all your systems.

Acreto SASE+Plus

sase plus - cybersecurity solutions
Overview

Technology architecture has undergone a wholesale change to largely distributed and mobile environments. Cloud, SaaS and IoT / OT now dominate the landscape, making traditional security products obsolete.

Acreto SASE+Plus is designed from the ground up to fundamentally solve the problems with traditional security. SASE+Plus introduces multiple innovations such as security Ecosystems, real-time threat learning and A.I. optimization.

Best of all, it’s 100% virtual end-to-end, eliminating the need for products altogether. These advances make SASE+Plus the most advanced, yet simplest security ever.

Getting Started

Get up and running with SASE+Plus in three simple steps.

1

Setup Ecosystem

Setting up your security Ecosystem only takes a few minutes!

Once you register your email, you can name your first Ecosystem and add a few Objects and Policies to get started. You can always add more or modify your configuration at any time.

sase plus
2

Connect

Acreto SASE+Plus is device and network agnostic and supports several methods to connect.

sase plus

Thing Connect – Individual devices connect via VPN using its on-board capabilities or you can use the Acreto client.

sase plus

Network Connect – Gateway connection for networks using your existing IPSec hardware or the Acreto Virtual Gateway (vGW ).

sase plus

Reflection Connect – SASE+Plus operates as a security relay between sources and your remote applications and systems that do not have a connection to Acreto.

3

Done

SASE cybersecurity solutions

Acreto SASE+Plus Benefits

Simple
  • The Ultimate Consolidation One security for all your Clouds, SaaS, networks, devices and IoT/OT.
  • 100% Virtual End-to-End Security without hardware, licensing or logistics to remotely secure anything, anywhere.

    Global Infrastructure in 10 Minutes

    Set up a global infrastructure in as little as 10 minutes.
  • Unburden Your Team Get out of the product and vendor housekeeping business.
  • Security Without Knobs & Switches Fully integrated platform without the integration that makes security complex.
Secure
  • All The Security You Need Integrates all the security fundamentals:
    • Access & Application Controls
    • Threat Prevention
    • Content Control
    • Identity
    • Encryption & Privacy
  • 360° Security Protects every Network Protocol, Port and Application for bi-directional communications.
  • Zero-Trust Everything, End-to-End Patented Nano-Segmentation goes beyond Zero-Trust to isolate and secure each technology individually.
  • Consistent Security Uniform security for your different devices, applications, networks, clouds and SaaS.
  • Bridging The IT and OT Divide Ecosystems and Nano-Segmentation isolate and protect IoT/OT elegantly.
Sustainable
  • Never Upgrade Again Security for the long-haul that’s always current and adapts to the ever-changing threat landscape.

    Affordable Security

    A whole new cost structure, so you don’t have to choose between the security you need and can afford.
  • Adaptive Feature Set Acret-OS' purpose-built security operating system is designed for real-time feature updates on-the-fly.
  • Network Agnostic Connect using any type of network from anywhere in the world.

Acreto SASE+Plus Features

  • Communication
    • Connectivity
      • VPN

        • TLS
        • IPSec

      • Proxy

        • Forward Proxy
        • Reverse Proxy

      • Direct Connect

        • 1 Gig Fiber
        • 10 Gig Fiber
        • MPLS

      • Reflection Connect
      • Optimized Internet

        Internet Wormholing Networking

    • Protocol Support
      • Network Protocols

        • TCP
        • UDP
        • ICMP

      • Network Ports

        • 1 – 65535

      • Application Protocols

        • All major application protocols

      • Application Programs

        Over 4,000 Application Program Signatures

    • Software Defined Perimeter (SDP)
      • VPN

        • TLS VPN
        • IPSec VPN

      • Enforcement

        • Next-Generation Firewall (NGFW)
        • Secure Web Gateway (SWG)
        • Cloud Access Security Broker (CASB)
        • Zero-Trust

    • Software Defined WAN (SD-WAN)
      • Connectivity

        • IPSec
        • Direct Connect
        • Reflection Connect
        • Proxy

      • Enforcement

        • Next-Generation Firewall (NGFW)
        • Secure Web Gateway (SWG)
        • Cloud Access Security Broker (CASB)
        • Zero-Trust
        • Clean Pipe

    • Converged SD-WAN and SDP
      • Connectivity

        • TLS VPN
        • IPSec VPN
        • Direct Connect
        • Reflection Connect
        • Proxy

      • Enforcement

        • Next Generation Firewall (NGFW)
        • Secure Web Gateway (SWG)
        • Cloud Access Security Broker (CASB)
        • Zero-Trust
        • Clean Pipe

  • Security
    • Next Generation Firewall (NGFW)
      • Access Controls

        • Network Service Control
        • Application Protocol Control
        • Application Program Control

      • Threat Prevention

        • Intrusion Prevention
        • Anti-Malware
        • Anti-virus
        • Anti-Spyware
        • Anti-Ransomware
        • Anti-BotNET
        • Anti-Exploit
        • Threat Protection Methods
          • Signature
          • Sandboxing
          • Threat Intelligence

    • Secure Web Gateway (SWG)
      • Access Controls

        • URL Filtering
        • File type Blocking
        • Data Leak Prevention Light (DLP)
          • Custom Data Pattern Filtering

    • Zero-Trust
      • Ecosystem Security

        Isolation and Security Per Application

      • Nano-Segmentation

        Individual isolation and security for each Ecosystem Member

      • Attack Surface Reduction

        Reduce attack surface for distributed technlogies

      • Dedicated Security Infrastructure

        Per application dedicated security infrastructure

    • Clean Pipe
      • Direct Connect
      • Virtual Clean Pipe
    • Cloud Access Security Broker (CASB)
      • AWS
      • Azure Google Cloud
      • Salesforce
      • Office365
  • Identity
    • Device Identity & Verification
    • User Identity & Verification
  • Privacy
    • SSL/TLS Decrypt, Scan & Re-encrypt
    • SSL TLS Decrypt, Scan & Offload
  • Address Translation
    • Source NAT & PAT
    • Destination NAT & PAT
    • Reflection NAT & PAT
    • Port Forwarding
  • Logging
    • Remote real-time Encrypted Log feed
    • Cloud Bucket
  • Governance & Compliance
    • Dedicated & Isolated Per Application Security Infrastructure
    • Isolated Per Application Change Management
  • Redundancy
    • Geo-Diverse N+1 Security Points
    • Simultaneous Geo-Diverse Connections
Acreto solves the difficult challenges of securing hybrid infrastructure end-to-end. They even solve problems some don’t realize they have, especially around IoT, Operationalized Technologies and multi-owner systems. The fact that Acreto does this completely virtually, without the need for any products, is a big advantage. https://acreto.io/wp-content/uploads/2020/08/author-ico-2.png Bob Flores
Former CTO, CIA

Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.




    Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.




      Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.




        Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic information.