Edgewise continuously scans the network to discover applications and services the moment they attempt to communicate. Our Zero Trust Identity (ZTID) governs communication between workloads and dependencies, and allows us to provide real-time application topology mapping.
Workload identity is the basis for Edgewise’s application-aware policies. This identity-based approach decouples security from the network (which is ever-changing in a container) and results in hardened policies that are portable across instances and environments. Edgewise machine learning automatically gathers data to ensure your workloads are always protected.
Every workload communication is verified by its ZTID. Only Edgewise can assure symmetric identity verification. Our patented verification process also facilitates anomalous behavior detection. Since security is tied to the identity of your applications, if a fingerprint changes, you are alerted in real time and can take immediate action, without disrupting the development workflow.
Edgewise’s zero trust security platform provides the broadest coverage across all environments, whether it is bare metal on premises, virtualized private cloud, or the public cloud. Supported container environments include Kubernetes, Docker, and AWS Elastic Container Service (ECS). Edgewise’s platform and products are API driven and can integrate with existing security tools and DevOps processes.
The automatically-created Edgewise policies are workload-centric and require no changes from development through production networks. Yes, Edgewise is CI/CD friendly.
Edgewise builds policies that are based on software identity—simpler and stronger segmentation, with fewer policies to manage.
Because Edgewise policies use software identity instead of network addresses to determine authorization, protection is consistent across dynamic environments. One product secures all of your workloads.