Zero Trust Solutions

The next-generation approach to enterprise security

An innovative outlook to next-generation security

Traditional businesses were built around security principles that mistrust everything outside the protected area or “perimeter”. But with newer, unconventional business models, this concept has evolved to accommodate the diminishing boundaries of the new-age workplace. A highly mobile workforce and borderless technologies like the cloud are forcing the organizations to adopt a zero trust approach to security.

Why
Zero Trust?

We provide Zero Trust Solutions, including secure application access, securing an organization’s backbone DNS, and solutions to enable “need-to-know access and monitoring”.

Our service offerings

Privileged Identity Management (PIM)

Monitor and secure privileged activities

Enterprise Application Access

Ensure only authorized users and devices have application access

Database Activity Monitoring

Monitor data access 24X7 and protect sensitive data in real time

User and Entity Behavior Analytics

Detect malicious insiders and compromises

Enterprise Threat Protector

Strengthen your DNS security and provide secure internet access

Privileged Identity Management (PIM)

Misuse of privileged user IDs can prove costly. Which is why, across the industry, compliance requirements, such as Sarbanes–Oxley Act (SOX), Payment Card Industry Data Security Standards (PCI-DSS), and Health Insurance Portability and Accountability Act (HIPAA), are becoming stringent.

Our PIM services reduce security risks, improve compliance and monitor privileged activities, while creating, implementing, and enforcing privileged account security policies to reduce the risk of a serious breach.

Key features

We offer PIM-as-a-service, which comes with the promise of unparalleled levels of infrastructure availability.

Greater control

  • Protect unauthorized use of privileged ID
  • Isolate and control uncontrolled access and sessions
  • Minimize data breaches and outages associated with uncontrolled access

Higher compliance

  • Reduce the risk of exposure to abuse or error
  • Maintain tamperproof logs of user access
  • Effectively improve compliance with industry regulations

Operational and cost benefits

  • Lower or optimal TCO for enterprise password vault solution
  • 99.95% availability of the PIM infrastructure to clients

Enterprise Application Access

The definition of a user has evolved to be much more than an employee in an office. The term "users" now also include endpoints, contractors, mobile workers and newly acquired employees of an acquisition. Legacy network security tools, built for the outdated notion of a secure perimeter, have not kept pace with today's needs for secure access. This leaves organizations vulnerable to attack from formerly trusted users.

Enterprise Application Access is a unique cloud architecture that closes all inbound firewall ports, while ensuring that only authorized users and devices have access to the internal applications they need, and not the entire network.

Key features

Zero Trust

  • Fast and secure access to internal apps over the internet
  • Application delivery and security architecture transformation based on zero-trust principles

Unified, remote access

  • Unified access with SSO across on-premise, IaaS and SaaS applications
  • DevOps and UAT access for remote employees without need for VPN

Advanced capabilities

  • Application modernization/migration to IaaS for any internal HTTP/S application

Database Activity Monitoring (DAM)

To detect unauthorised actions or suspicious activities by privileged insiders and potential hackers, our DAM-as-a-service offering continuously monitors all data access in real time. This service helps to protect against internal and external threats, by identifying data risks in a timely manner. Quick and multiple deployment options and out-of-the box integration help to reduce TCO.

Key features

Visible

Complete visibility and granularity across databases

Tamper-proof

Secure audit trail to support segregation of duties

Real-time alerts

Security alerts are provided by integrating with SIEM platform

Customizable

Custom compliance workflows and built-in reporting

User Behaviour Analytics

Our User Behaviour Analytics offering analyses user activity to detect malicious insiders and determine if a user’s credentials have been compromised. Security analysts can easily see risky users, view their anomalous activities and drill down into the underlying log and flow data that contributed to a user’s risk score. As an integrated component of the security intelligence platform, UBA leverages out-of-the-box behavioural rules and machine learning (ML) models to add user context to network, log, vulnerability and threat data to detect attacks quickly and accurately.

Key features

Advanced detection

  • Detects insider threats based on user behavioral anomalies

SIEM integration

  • Built on top of the app framework to use existing data in SIEM to generate new insights

Compliance and assessment

  • Automate compliance and auditing
  • Vulnerability assessment; encryption: data at rest

Enterprise Threat Protector (ETP)

The volume and sophistication of targeted threats continues to grow dramatically. Users want internet access from everywhere, and organizations are struggling to keep pace with this new threat landscape. Organizations that have an emerging approach to security need to quickly deploy robust and effective security solutions that do not require disruptive changes to their network and need minimal management.

ETP is a cloud-based Secure Web Gateway (SWG) that helps security teams ensure that users and devices can safely connect to the internet, regardless of where they are connecting from and without the complexity associated with legacy approaches.

Key features

Proactive malware protection

  • Uses recursive DNS, combined with industry-leading threat intelligence
  • Additional layer of protection for on and off network using recursive DNS
  • Protect against malware, phishing and DNS-based data exfiltration

Enforce acceptable use policies

  • Block potential threats effectively and consistently
  • Identify and block access to malicious domains

100% cloud-based solution

  • Configure and deploy globally in minutes (with no disruption for users)
  • Prevent access to inappropriate content
  • Improve security defences by proactively blocking malicious communication

Why NTT-Netmagic?

Extensive global track record

NTT security specialists mitigate billions of security threats every year.

Superior customer experience

Access to comprehensive analytics, service delivery and process development

Financial stability

We're an integral part of a NTT Ltd. - a leading global technology services company.

Deep
investment

We invest in innovative solutions and groundbreaking service development.

Insights