CoIP Enclave enhances a company’s existing security architecture by providing an extra layer with additional controls. The technology operates at the session layer in the ISO network model (L5), using but not interfering with the existing network and security infrastructure. CoIP isolates traffic end-to-end in encrypted SSL tunnels that are set up to support application traffic on an as-needed basis. The endpoint network can be locked to the CoIP Enclave; by requiring traffic to travel over the CoIP overlay network and blocking other traffic that comes in over the physical interface, the endpoint is effectively invisible to other endpoints, even on the same subnet.
Inside the CoIP Enclave, security features like micro-segmentation and Application Interlock enable fine-grained access controls for the overlay network. Micro-segmentation rules can span multiple public and private clouds and datacenters, segmenting network traffic in both east-west (between servers in the same subnet) and the north-south direction (between clouds or network domains). Application Interlock enables whitelisted access to the overlay network for specific applications, preventing unauthorized applications from accessing networking resources and avoiding CPU-intensive and error-prone deep-packet inspection (DPI). All policies are created and maintained in the CoIP Controller and are enforced on distributed endpoints for optimized performance and scalability.
Copyright © 2018 Zentera Systems, Inc.
All Rights Reserved.
All other trademarks and copyrights are the property of their respective owners.