top of page

Use Cases


Access Control

Traditional network solutions expose public ports, the connection represents a single point of failure.

When employees have too many access rights beyond their actual needs, insider threats become an important security issue.

A serious impact could be caused regardless of whether the abuse of authority is caused by an employee, or a hacker using internal personnel ID to access the company's network.

Frame 48.png

Centralized user access management system ensuring resources and data are allocated to the right and necessary user. Accounts are protected by 2FA authentication system.


Record of activity information connected to SIEM and blockchain systems, ensuring immutability and the integrity of the record.


Rapidly scaling team and business, and M&A create difficulties in the maintenance of networks and management of employees onboarding/offboarding.


Time and effort-consuming process of keys verification and resource access policies configuration.


Administrative burden on the IT team impacts productivity.

Simple deployment, no configuration files, can easily deploy alongside existing network infrastructure.


Centralized authority, facilitate provisioning and deprovision process. Augment automation capabilities reduce effort on manual maintenance and monitoring.

Frame 48.png
use-case-illustration (1)-13.png


As more and more companies adopt Work From Anywhere, video calls and using online media from home is consuming network traffic.


Traditional network solutions have too much latency, a reliable and performant connection is required to ensure the stability of the network connection.


Companies can’t afford to compromise on network security and development efficiency.

Frame 48.png

Network microsegmentation and end-to-end encryption optimize network connection for hybrid workforce and cross-cloud infrastructure. Improved user experience enhances end user productivity.

bottom of page