polygon big data illustration

AMBIT SENTRY

Simple - Seamless - Secure

Cybersecurity specialists who simplify your Zero Trust journey, by combining people, processes, and technology to ​protect your data, application, assets, and services (“DaaS”), where ever it resides.

What can we do for you?

Zero Trust

We will assist you in designing and implementing a resilient, business-aligned cybersecurity strategy.

People

  • Consumer of the Daas
  • Management and Implementation of the process
  • Board and Exco level

Process

  • Crafted process that ties the people and technology to achieve the set Zero Trust goals

Technology

  • Technology to implement the Zero Trust strategy

Conventional VS Our Approach to cybersecurity

Inside Out Approach -

We prioritize safeguarding the “DaaS” and then focus on the asset’s consumer.

Conventional

Ours

Focuses on protecting the path:

The space between the user and the data.

Focuses on safeguarding the asset

where it resides, by cloaking it.

Lock

Identifies packet flows, IP addresses,

ports, and protocols, entering,

and exiting the host, in realtime.

Monitors the path for any

suspicious activity.

Prevents suspicious activity, by analyzing observed patterns.

Responds to suspicious activity, by implementing an incident

response plan.

Our Solutions

Our Software Defined Perimeter Framework ​(“SDP Framework”) provides authentication, ​authorization and service cloaking on any host in ​the cloud or on the premises, and Identifies flows, ​IP addresses, ports and protocols entering and ​exiting the host in real time.


Service cloaking refers to the practice of ​concealing the “DaaS” residing on any host, from ​everyone, except authenticated and authorized ​users.


Our SDP Framework protects services by ​separating the access control and data planes, ​using single packet authorisation (SPA) to ​establish TRUST between the user/device and the ​Service.


Our SDP Framework

Each component within Our SDP Framework can either function independently from each other or together, depending on your requirements.

1.

Port cloaking, authorization and authentication services, with an embedded policy engine to protect a single or multiple ports residing on any host.

2.

Service cloaking, authorization and authentication services for DaaS, with an embedded policy engine to protect all ports on the host.

3.

Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) services, with an embedded policy engine that enables IPS functionality, capturing all packet flows, IP addresses, ports and protocols entering and exiting the host, in real-time.

4.

A customized platform to manage and display cybersecurity health and monitoring data in real time, with the ability to integrate with other applications, such as SIEM’s e.g. Elastic or Splunk.

Services

Our services are designed to assist you with designing, implementing and maintaining a resilient, business-aligned cybersecurity strategy.

Our Inside Out Approach

The conventional method asks the question: What am I defending against?


We ask the question: What are we protecting? - We secure - We monitor - We prevent.

DaaS location

Protected host

cloud, clouds shape
cloud, clouds shape

DC

ICS

Cloud

Shield Security Symbol
Laptop Outline Icon

Asset User

AES with HMAC

IoT

Secure

Monitor

Block

Solutions Explained

Our Story

When Ambit Sentry was ​formulated by its three ​founders, we envisioned and ​built a SDP solution that ​simplifies developing, ​implementing and managing a ​Zero Trust strategy. To achieve ​this we had to set ourselves ​some challenging design ​objectives.

Data, assets and resources do ​not only reside in the cloud, but ​in multiple locations across ​multiple domains i.e., ICS, IoT ​etc. To address this, we ​designed a secure solution that ​resides on and protects the ​host, while consuming as few ​resources as possible on that ​host.

Our main objective was to assist ​clients to develop and implement a ​Zero Trust strategy; and design a ​solution that is simple to use, ​completely client deployed and ​managed, and ensure we never ​have access to our clients’ “DaaS” or ​systems. We achieved our objective! ​Our solution is also interoperable and ​seamlessly integrates into other ​systems such as SIEM’s.

Our Vision

To build a globally recognised cybersecurity organization specialising in Zero Trust, while remaining true to our African ​roots.

Our Mission

To continuously improve Our SDP Framework, to simplify the implementation of customers Zero Trust strategies.

Our Values

Mutual Respect. Integrity. Honesty. Ethical Business practices.

  • South African company
  • Level 1 BBBEE
  • Industry knowledge experts
  • Cyber-security vendor - only SDP vendor from Africa
  • Participants in industry bodies specific to Zero Trust, IoT and SDP

Frequently Asked Questions

What is DaaS?

  • DaaS is an acronym used to describe data, applications, assets, and services that are critical to an organization.


  • Data – all data within the organization.


  • Applications – all applications e.g., CRM, ERP etc.


  • Assets – could take the form of BLOB or unstructured data.


  • Services are applications running at the network level or above and provides different capabilities i.e., DNS, email, file sharing etc.


Is an asset and DaaS the same thing?

  • An asset is a term that is interchangeable with DaaS and could reference a single element of DaaS or all the elements.

What is a host?

  • A host is the system where the DaaS resides. This could be virtual or physical, in the cloud or on premises, on IoT ​devices, or Raspberry Pi’s, or in containers.

What is Zero Trust

  • Zero Trust is a strategic cybersecurity approach that applies the “never trust, always verify” principle to all systems ​and processes. It requires all users and devices to be authenticated and authorized, before being granted access ​to assets.

What is an SDP?

  • A software defined perimeter focuses on protecting the organizations critical resources, by rendering them invisible; and only granting access to authorised and authenticated users.

Have more questions? Feel free to contact us for more information.

Talk to us!

polygon big data illustration

We would like to hear from you. Leave us a message and we will contact you as soon as possible.

AMBIT SENTRY

Simple - Seamless - Secure

+27 72 421 2000

Telephone Glyph Icon

info@ambitsentry.com

Mail Icon

@2024 Ambit Sentry - Terms and Conditions