In an era of evolving cyber threats and regulatory requirements, organizations face the critical challenge of securing their networks while ensuring compliance with stringent regulations. Exium's Secure Access Service Edge (SASE) platform introduces a revolutionary approach to cybersecurity, combining the principles of Zero Trust with time-bound security policies. This innovative feature not only enhances organizational compliance but also provides robust protection against cyber threats.
Regulatory Compliance |
Dynamic Cyber Threat Landscape |
---|---|
Organizations must adhere to industry-specific regulations, requiring stringent control over data access and security measures. | Cyber threats are continuously evolving, demanding adaptive security measures to safeguard against sophisticated attacks. |
No |
Key Components of Exium SASE Solution |
---|---|
1 |
Zero Trust Principles:
|
2 |
Time-Bound Security Policies:
|
3 |
Compliance Assurance:
|
4 |
Adaptive Security Posture:
|
5 |
User-Centric Controls:
|
Exium enables workspace admins with multiple options to configure Time-Bound Security Policies. Time-Bound Security Policies are defined in the central admin console and applied in the Exium Cloud CyberMesh platform as shown in the below architecture diagram.
You can define Time-Bound Security Policies at workspace level, group level or user level as shown in the Table below:
Time-Bound Security Policies |
Workspace level |
Group level |
User level |
---|---|---|---|
Policy Definition | Applies to all users in the workspace or in the organization | Applies to all users in the group | Applies to a particular user |
Limited Access to specific services in a network (Non-Recurring Time-Bound) |
√ |
√ |
√ |
Limited Access to specific services in a network (Recurring Time-Bound) |
√ |
√ |
√ |
Policies override precedence/ order |
Lowest |
Middle |
Highest |
You can define limited ZTNA policies at workspace level which will be applied to all users in the workspace. To create ZTNA policies, follow the below steps
On Create Policy form, follow below steps
Limited ZTNA policies gets applied to all users in workspace immediately after submit based on the start date/time. All users in workspace will be able to access the specific service defined in this policy. The policy will become inactive automatically after end date/time.
You can define limited ZTNA policies at group level which will be applied to all users in that group. To create ZTNA policies, Follow below steps
On Create Policy form, follow the below steps
Limited ZTNA policies gets applied to all users in group immediately after submit based on the start date/time. All users in that group will be able to access the specific service defined in this policy. The policy will become inactive automatically after end date/time.
You can define ZTNA policies at user level which will be applied to all users in that group. To create ZTNA policies, Follow below steps
You can define the policy as shown in the previous steps. You need to select All Rules in policies table before creating the policy
To Assign the policy to User, follow below steps
Limited ZTNA policies gets applied to the user immediately after submit based on the start date/time. User will be able to access the specific service defined in this policy. The policy will become inactive automatically after end date/time.
You can define limited ZTNA policies at workspace level which will be applied to all users in the workspace. To create ZTNA policies, follow the below steps
On Create Policy form, follow below steps
Limited ZTNA policies gets applied to all users in workspace immediately after submit based on the day and start time. All users in workspace will be able to access the specific service defined in this policy. The policy will become inactive automatically after end time of the day and gets repeated based on the next day and time.
You can define limited ZTNA policies at group level which will be applied to all users in that group. To create ZTNA policies, Follow below steps
On Create Policy form, follow the below steps
Limited ZTNA policies gets applied to all users in group immediately after submit based on the day and start time. All users in group will be able to access the specific service defined in this policy. The policy will become inactive automatically after end time of the day and gets repeated based on the next day and time.
You can define ZTNA policies at user level which will be applied to all users in that group. To create ZTNA policies, Follow below steps
You can define the policy as shown in the previous steps. You need to select All Rules in policies table before creating the policy
To Assign the policy to User, follow below steps
Limited ZTNA policies gets applied to the user immediately after submit based on the day and start time. User will be able to access the specific service defined in this policy. The policy will become inactive automatically after end time of the day and gets repeated based on the next day and time.
Exium SASE's integration of time-bound Zero Trust security policies represents a significant leap forward in cybersecurity. By combining Zero Trust principles with time-sensitive access controls, organizations can achieve regulatory compliance, proactively mitigate cyber threats, and foster an adaptive and resilient security posture. Embrace the future of cybersecurity with Exium SASE.
To learn more about implementing SASE for your organization and explore tailored solutions that meet your unique requirements, contact Exium at partners@exium.net for a consultation or demonstration. If you are ready to get started, check out our testing and onboarding process.