top of page

Use Cases


Access Control

Traditional network solutions expose public ports, the connection represents a single point of failure.

When employees have too many access rights beyond their actual needs, insider threats become an important security issue.

A serious impact could be caused regardless of whether the abuse of authority is caused by an employee, or a hacker using internal personnel ID to access the company's network.


Centralized user access management system ensuring resources and data are allocated to the right and necessary user. Accounts are protected by 2FA authentication system.


Record of activity information connected to SIEM and blockchain systems, ensuring immutability and the integrity of the record.

Frame 48.png


As more and more companies adopt Work From Anywhere, video calls and using online media from home is consuming network traffic.


Traditional network solutions have too much latency, a reliable and performant connection is required to ensure the stability of the network connection.


Companies can’t afford to compromise on network security and development efficiency.

Frame 48.png

Network microsegmentation and end-to-end encryption optimize network connection for hybrid workforce and cross-cloud infrastructure. Improved user experience enhances end user productivity.


Deployment Compliance

Service deployment at client side often faces information security regulations. It is necessary to establish complex firewall rules, which incur significant management costs when an architecture change is required.

Frame 48.png

Adopting the principle of least privilege reduces the attack surface. The abuser is unable to use upgraded privileges to expand access and proceed lateral movement. Effectively prevent malicious or unintentional damage to critical systems.

bottom of page