A security model framed on the assumption that any entity attempting to connect to network resources could pose a threat and therefore should be treated as potentially hostile. This leads to instrumentation of security controls that ensure least privileged access, abstraction of the location of application endpoints, restriction of lateral movement and identity validation before connection access is granted.
Talk to Us!
Do you have application delivery questions? Our engineers would love to help!
Progress and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See
Trademarks for appropriate markings.