<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381191815628942&amp;ev=PageView&amp;noscript=1">
Technology-Assert-Trust-3-p-500.png

What is Trusted Application Networking?

Trusted Application Networking is a radically new approach to protecting cloud workloads using machine learning-based technology. It eliminates 98% of network attack surface and protects the rest by allowing only verified applications to communicate over approved network paths. It abandons traditional network address constructs and embraces zero trust networking for superior protection and simplified management at scale.

Network Addresses are Not Trustworthy

Traditional address-centric firewalls allow malicious communications to piggyback on allowed network policies because they lack visibility and control beyond primitive network attributes.

While next-generation firewalls are aware of application protocols, they are blind to the true identity of the communicating software.

Microsegmentation offers more visibility and control of network traffic within the perimeter. However, the large number of address-centric policies needed to enforce the principle of least privilege makes microsegmentation overly complex, without any gain in security.

New Models of Trust

To overcome limitations described above, Gartner recommends a continuous adaptive risk and trust assessment (CARTA) model and Forrester espouses the zero trust networking model which abandons the traditional security model of allowing application communications based on “trusted” addresses. Instead, communications are approved based on the trustworthiness of communicating software, hosts and users—for better security that extends beyond the network.

Trusted Application Networking

Trusted Application Networking

Edgewise’s revolutionary approach—Trusted Application Networking—incorporates the essence of the CARTA and zero-trust models by allowing only trusted applications to communicate over approved network paths to stop compromise and attack progression of network-borne threats. This new technology, powered by machine learning, works by looking beyond network addresses and instead validates the secure identity of applications, users, and hosts controlling the addresses. Application identities are continually evaluated to ensure a high degree of confidence in the protection. Edgewise enables application, security, and network teams to collaborate more effectively and assist the business in becoming more agile while protecting mission-critical cloud applications.

Pre-connect Validation:

Stops transport-layer exploits by mutually validating applications before they connect

Policy Compression:

Broadest coverage with the fewest application-centric policies, which are more effective than firewall address-based controls

Zero Impact:

Deploys in minutes, without changes to applications or network infrastructure
 
 

Edgewise Networks small logoEdgewise Protect

Protects Workloads and Stops Attacks

Stop lateral movement of malicious software that bypasses firewalls. Lock down your cloud and allow only verified applications to communicate over approved pathways. Receive alerts for any anomalous communication.

Eliminates Network Attack Surface

As much as 95% of network pathways are not required for normal business use. Eliminate unneeded application communication paths and protect the rest by mutually validating connections before a single packet is sent.

Immediate Time To Value

Apply workload protection policies in minutes, not days or months. Quickly approve machine-learned and automatically-built policy recommendations.

 
logos