An Ecosystem is a dedicated security infrastructure for each application, use-case, project, department or third-party. Ecosystems isolate and secure Ecosystem members that are users, devices, systems and applications that need to interoperate. Anything else won’t even know that the Ecosystem exists -- even if they are on the same network.
Rather than implementing one-off security products everywhere, simply connect the assets you want to protect to one or more Ecosystems. All the security functionalities are immediately available.
In order for any asset to become a member of the Ecosystem, Acreto implements a Identify, Connect, Isolate and Protect process.
Identity- User or Device identity is validated. MFA and PAM are enabled.
Once Identified, the asset is connected to one or more authorized Ecosystems as a member.
Each Ecosystem member is isolated from other Ecosystem members and non-members alike.
Full inline controls, including access, application and content controls as well as robust threat and intrusion prevention.
Any Technology, On Any Network, Anywhere.
Computer (Org Owned or BYOD)
Mobile Phone / Tablet (Org Owned or BYOD)
Small Office / Home Offices
ATMs / ITMs
Imaging System / PACS
Diagnostic / Test Equipment
Cloud VPCs / Cloud Networks
Acreto offers a variety of ways to connect your Access or Application Delivery technologies. Depending on the customer use-case and requirements, one, some or all of these methods may be utilized to facilitate end-to-end security.
Acreto Direct Connect (HyperScale, 1Gbps - 100Gbps)
Acreto Client Connect
Acreto vGateway (vGW)
Acreto Client-Less Connect
Acreto supports all possible data-flow models to address all use-cases for end-to-end interconnection and security.
Ecosystems deliver a dedicated security infrastructure that can be deployed per application, use-case, project, department or third-party. An Ecosystem inherently limits access only to users, devices, systems and applications that need to interoperate together.
Ecosystems support any technology, on any network, anywhere in the world. These include computers, mobile devices, IoTs, Offices, Clouds, SaaS and Data Centers.
Ecosystems can be configured as:
Open → With inbound or outbound access from or to the Internet or a third-party
Closed → Fully contained with access limited to Ecosystem members
Hybrid → Where some systems have inbound or outbound Internet access while others operate fully contained.
Eliminates any and all access from the Internet while Ecosystem members can interoperate with authorized systems and applications.
Ecosystems can easily isolate individual or groups of systems on a shared network or entire networks, to limit access only to systems that need to interoperate together. This is done with
Segmenting groups of systems on any shared network, including hostile networks or the entire network.
Nano-Segmentation / NAC
Isolating an individual system, device or application to limit access only to other authorized Ecosystem members.
Isolated data flows can be defined between two Ecosystem members to limit access to specified sources and destinations, network protocols and ports, application protocols as well as application programs.
Secure Scan addresses a key weakness in many security tools today. 90%+ of all communications is encrypted, yet only 10% of organizations have the means to secure these communications. Encrypted Secure Scan decrypts, scans, and re-encrypts communications inline and in real-time.
Any malicious content embedded in the encrypted payload is blocked, otherwise the clean and validated communication is delivered to its final destination.
Support for IPv4 and IPv6