Replace your obsolete VPN with a modern

Software-Defined Perimeter (SDP)

Develop a secure, flexible access policy with a Software-Defined Perimeter (SDP). Whether your key resources are in the cloud or on local servers, SDP lets IT protect the entire network.

  REGOL For Android   REGOL For IOS   REGOL For Windows   REGOL For Linux   REGOL For MacOS Intel   REGOL For MacOS Arm

Block hackers from the network, in one swift motion

SDP deploys multiple cutting-edge security tools and is easily implemented, even and especially for modern organizations 
with complex cloud networks, many remote users, and varying access requirements.

Zero Trust Access

Multiple layers of authentication come before access, including user and device verification.

Reduced Attack Surface

Give each user his or her own encrypted connection and relevant, limited access to the network.

Granular Access Control

Easy, central management of granular access policies across users and groups.

Hybrid Security

Software-Defined Perimeters are hardware and cloud agnostic, fitting any network.

How Does a Software-Defined Perimeter Work?

SDP network architecture has three important components: the SDP Client, the SDP Controller, and the gateway PoP.

SDP Client: Access Control

The client uses an Identity Provider, such as 
Okta, Google, or Azure, to authenticate identities.
It directs approved applications to authorized 
remote connections, making certain that the 
certificate-based mutual TLS VPN connects 
only with authorized services. Additionally, network traffic is encrypted and channelled between  the user's device and the designated gateway.

SDP Controller: Trust Broker

The controller builds trust between the SDP 
Client and backend security measures by 
authenticating users and devices. It verifies 
user and network entitlements through an 
evaluation involving the Issuing Certificate 
Authority and the Identity Provider. The SDP 
Controller then configures the gateway in 
real-time to establish a mutual TLS connection.

The Gateway: Termination Point

The gateway grants access to previously
private resources, allowing employees to have
a private and uncongested connection. This
termination point for the mutual TLS
connection from the Client verifies the identity
of the requesting device, authorizes the user,
and grants access to the requested network. 

Protected access to resources tailored for individual users

Before allowing a user to access the network, it is crucial to verify both their identity and the security of their device. Utilizing third-party identity providers and Single Sign-On simplifies the user authentication process. Meanwhile, device posture check rules and additional endpoint tools help ensure that their devices are secure.

Segment the network for a safer network

While VPNs may offer encrypted network access, they don't have the capability to grant access to specific network resources for individual users or groups. REGOL's Software-Defined Perimeter (SDP) comes with built-in micro-segmentation, ensuring your most sensitive resources stay protected and are not unnecessarily exposed.

Central policy management for teams

While VPNs may offer encrypted network access, they don't have the capability to grant access to specific network resources for individual users or groups. REGOL's Software-Defined Perimeter (SDP) comes with built-in micro-segmentation, ensuring your most sensitive resources stay protected and are not unnecessarily exposed.

Seamlessly integrated edge security

REGOL allows organizations to fully implement the SDP model, seamlessly integrating it with any on-premises or cloud infrastructure. It provides instant deployment of encrypted gateways globally, ensuring low latency for remote workers and their devices.

The perimeter has changed, and security 
needs to evolve along with it

Moving key resources to the cloud, enabling employees to work remotely, and embracing BYOD (Bring Your Own Device)  create security risks that require the flexibility of SDP to handle—both within and outside the network.