Simple, Secure Remote Access to Applications Behind the Firewall
Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, enterprises must also deal with the riskier proposition of providing this same access to third parties, including their contractors, partners, suppliers, and customers. Enabling secure application access, whether hosted in a public cloud or private data center, is a complex, cumbersome task requiring on-premise hardware and software such as Application Delivery Controllers (ADCs), Virtual Private Networks (VPN), Identity Management Systems (IAM), and more. Yet with all of these technologies, enterprises are exposed to a variety of security risks, now compounded by the growing network presence of untrusted third-party users. Fortunately, Akamai’s Enterprise Application Access solves these problems and helps enterprises transform remote access to meet today’s mobile and cloud-centric requirements while improving an organization’s overall security posture.
Enterprise Application Access
Enterprise Application Access is a new approach to remote access. It provides a unique, secure, and more convenient alternative to traditional remote-access technologies such as VPNs, RDP, and proxies. With Enterprise Application Access, no one can get to applications directly because they are hidden from the Internet and public exposure. A unique cloud architecture closes all inbound firewall ports while providing authenticated end users access to only their specific applications. Enterprise Application Access integrates data path protection, identity access, application security, and management visibility and control into a single service.
Enterprise Application Access can be deployed in minutes through a unified portal with a single point of control, in any network environment, and at a fraction of the cost of traditional solutions. The result is a secure-access delivery model that enables a zero CapEx, low OpEx model for critical workloads deployed in any environment.
How it Works
Enterprise Application Access provides secure access as a service that eliminates the need to punch holes in the network perimeter. Instead, users access applications through the cloud, which stops and secures user access far outside your network. With Enterprise Application Access, there is no direct path into your applications. Instead, Enterprise Application Access dials out a secure, mutually authenticated TLS connection from within your network or cloud and brings the application to the user.
Since there are no tunnels, there is no path for malware to land inside your network and potentially spread to sensitive or privileged systems. All user connections are stopped in the cloud, terminating on secure proxies while applying strong authentication and security controls. You can add your own security controls for increased protection of highly sensitive applications.
Enterprise Application Access makes accessing applications fast and intuitive for end users. Forget the support calls for poor application performance, VPN connectivity issues, and device incompatibilities. Enterprise Application Access optimizes applications and presents them in any browser on any user device — and with enterprise-grade single-sign-on and intelligent multi-factor authentication, security is no longer a burden for users or IT.
Enterprise networks are not a problem for Enterprise Application Access. With one-click integrations for Active Directory, SAML providers, CDNs, forward proxies, SIEM tools, and other infrastructures, custom scripting and integration are eliminated. Scaling and deploying apps across public and private infrastructures is a snap with built-in high-availability capabilities, server load balancing, and automatic application routing.
- Users access applications from any device on any browser – without any additional software, including VPNs and browser plugins
- Stand up new applications and provision users in minutes
- Use a service that consolidates ADCs, Wan Optimization, VPN, & 2FA
- No hardware or network changes required – firewall rules, IP address white listing, etc.
- Keep all users off of your network
- Lock down your firewall or security group to all inbound traffic
- Make your applications invisible to the Internet
- Easily add MFA to any app with the click of a button
- Complete auditing and reporting of user activity
- Available as built-in reports or can be integrated with your existing tools