Hi,
Yes, you are right, the goal of SDP solutions is to verify the user and their device prior to granting access to the service.
This is done by authenticating the user before allowing access, as well as performing a posture check for the user's device, validating the source IP from which the user is coming, etc.
Does this make sense?
Eitan
------------------------------
Eitan Bremler
Co-founder and VP Corporate Development
Safe-T
------------------------------
Original Message:
Sent: May 19, 2021 11:39:28 AM
From: Jenna Morrison
Subject: SDP Security Architecture Connection or IP Based?
Thanks for your reply,
I've been trying to clarify this piece of text: "SDP provides a connection-based security architecture instead of IP-based alternatives."
If I understand this correctly, I think they mean that SDP provides access after verifying the device (through Name-to-address resolution? and possibly certificates?) but on top of this traditional way of verifying a device, it also uses user authentication and authorization before granting access? And thus it is a connection-based security architecture instead of solely IP-based? As it uses both IP-addresses and user ID to verify the connection?
------------------------------
Jenna Morrison
Training Department Intern
Cloud Security Alliance
Original Message:
Sent: May 04, 2021 07:12:32 AM
From: Eitan Bremler
Subject: SDP Security Architecture Connection or IP Based?
Hi Jenna,
Do you mean provide access based on IP address rather than user ID?
Eitan
------------------------------
Eitan Bremler
Co-founder and VP Corporate Development
Safe-T
Original Message:
Sent: Apr 30, 2021 08:53:51 AM
From: Jenna Morrison
Subject: SDP Security Architecture Connection or IP Based?
Hello,
Would someone be able to clarify for me whether SDP's security architecture is solely connection based or can it also be IP based?
Thanks :)
------------------------------
Jenna Morrison
Training Department Intern
Cloud Security Alliance
------------------------------