
Use Cases
Management
Access Control
Traditional network solutions expose public ports, the connection represents a single point of failure.
When employees have too many access rights beyond their actual needs, insider threats become an important security issue.
A serious impact could be caused regardless of whether the abuse of authority is caused by an employee, or a hacker using internal personnel ID to access the company's network.



Centralized user access management system ensuring resources and data are allocated to the right and necessary user. Accounts are protected by 2FA authentication system.
Record of activity information connected to SIEM and blockchain systems, ensuring immutability and the integrity of the record.
Scalability
Rapidly scaling team and business, and M&A create difficulties in the maintenance of networks and management of employees onboarding/offboarding.
Time and effort-consuming process of keys verification and resource access policies configuration.
Administrative burden on the IT team impacts productivity.
Simple deployment, no configuration files, can easily deploy alongside existing network infrastructure.
Centralized authority, facilitate provisioning and deprovision process. Augment automation capabilities reduce effort on manual maintenance and monitoring.

-13.png)

Sustainability
As more and more companies adopt Work From Anywhere, video calls and using online media from home is consuming network traffic.
Traditional network solutions have too much latency, a reliable and performant connection is required to ensure the stability of the network connection.
Companies can’t afford to compromise on network security and development efficiency.

Network microsegmentation and end-to-end encryption optimize network connection for hybrid workforce and cross-cloud infrastructure. Improved user experience enhances end user productivity.

