Ambit Software Defined Perimeter (SDP)
The Ambit SDP is a cutting-edge security solution designed to protect services, applications, data, and resources by cloaking them on the host system. It provides “just-in-time” access, ensuring only authenticated and authorized users or devices can interact with these resources. Ambit SDP also offers comprehensive visibility into network activity by capturing, monitoring, and analyzing packet flows in real time—all through a single management console.
Key Components of Ambit SDP
Agent + Client
- Responsible for cloaking services and enforcing authentication and authorization mechanisms.
- Protects resources by ensuring only verified users or devices can gain access.
Insights
- Captures and monitors all data traffic moving in and out of the host in real time.
- Analyzes packet flows, offering deep insights into network activity, security events, and performance metrics.
Ambit Management Console (AMC)
- A centralized platform that provides a comprehensive view of the system’s health and performance.
- Displays real-time insights from the Agent + Client and Insights components, while allowing for policy management and system customization.
Flexible Operations
- Each component can function independently or as part of the complete Ambit SDP.
- The Agent + Client can operate without Insights.
- Insights data can be viewed in any SIEM (Security Information and Event Management) tool such as Elastic or Splunk, without needing the AMC.
How Ambit SDP Works
Ambit SDP operates by ensuring that only authenticated and authorized clients can access protected services. Here’s a breakdown of how the process works
Client Initiates Request
The client (a device requiring access to a service) sends a single, encrypted UDP packet to the agent for authentication and authorization.
- Client Examples: Mobile devices, computers, servers, network devices, IIoT, or IoT devices.
Agent Receives and Verifies
The agent, residing on the host where the service is located, receives the packet. The packet is decrypted and its authenticity is verified using asymmetric encryption.
- Agent Location: The agent can be hosted on a server, virtual machine, private or public cloud, IIoT, or IoT devices.
Port Access Granted
Upon verification, the agent opens the required port for the necessary time window to allow the client access to the protected service. After this period, the port is closed, ensuring strict control over access
Secure Communication Ensured
- This entire process ensures that only authorized clients are allowed to access sensitive services or data, significantly improving security by reducing the risk of unauthorized access.
Insights – Capturing, Monitoring and Analysing
Ambit insights captures, monitors and analyses all packet flows passing in and out of the host in real-time, using its IDS and IPS function.
Important: Network Flow refers to the traffic passing in and out of the host only, and not the organisations network traffic.
Why Choose Ambit SDP ?
Just-in-Time Access
Reduces security risks by allowing access only when needed.
Monitoring & Analytics
Ensures continuous visibility and security insights.
Modular Flexibility
Deploy components individually or as a comprehensive suite.