top of page

Use Cases


Access Control

Traditional network solutions expose public ports, the connection represents a single point of failure.

When employees have too many access rights beyond their actual needs, insider threats become an important security issue.

A serious impact could be caused regardless of whether the abuse of authority is caused by an employee, or a hacker using internal personnel ID to access the company's network.

Frame 48.png

Centralized user access management system ensuring resources and data are allocated to the right and necessary user. Accounts are protected by 2FA authentication system.


Record of activity information connected to SIEM and blockchain systems, ensuring immutability and the integrity of the record.


Rapidly scaling team and business, and M&A create difficulties in the maintenance of networks and management of employees onboarding/offboarding.


Time and effort-consuming process of keys verification and resource access policies configuration.


Administrative burden on the IT team impacts productivity.

Frame 48.png

Simple deployment, no configuration files, can easily deploy alongside existing network infrastructure.


Centralized authority, facilitate provisioning and deprovision process. Augment automation capabilities reduce effort on manual maintenance and monitoring.

use-case-illustration (1)-13.png

Network Management

Public IP port security represents vulnerabilities, frequent cyberattacks are penetrating via IP router VPN.


Using an untrusted and unprotected network, could be easily infected by ransomware. The ransomware controlling a server will infect other servers by a lateral movement.

Invisible IP and distributed virtual IP protect the connection environment from public exposure. With the principle of least privilege, minimize attack surface secure critical systems.

Frame 48.png
bottom of page