Safe-T is a leading provider of software-defined access solutions which mitigate attacks on enterprises business-critical services and sensitive data.

A few months later, myself and Shachar Daniel joined.

We also have teams operating in the US, Europe and Asia.

Secure Your Data with Software Defined Access

What’s unique about Safe-Ts solution?

Named Software Defined Access, our primary solution aims to govern the complete life cycle of active data access.

We want to control how users access data.

Article image

Once access is granted, we control what the user can do with the data.

For example, can the user upload, download, view, edit, or delete a file?

Which web-pages in a backend can he access, and so on.

Article image

So, what is our uniqueness in this process?

This gives us end-to-end control and end to end data protection.

Secondly, We have the ability to detect anomalies in user behavior.

Article image

What can you tell us about Safe-T’s Behavioral anomaly detector?

We have a module that looks at all data being logged.

Think about a user accessing storage outside of the usual business hours.

Article image

Our solution integrates with the organizations existing infrastructure, their data stores and authentication measures.

We don’t store user data, we only store event logs, so theres no privacy issue here.

What is a ZERO TRUST Digital business, and what differentiates it from a traditional business?

Article image

Until zero trust emerged as a concept, everything was based on trust.

The world is now moving to zero trust.

First authenticate, then trust, and not the other way around like it was in the past.

Another term which is relevant is Software Defined Perimeters, which goes hand in hand with zero trust.

Fifty years ago, most organizations were like an island, because everything was done on paper.

Employees were the only ones allowed to use data, without external parties like customers, business partners etc.

Now, as the world is becoming more digitized, more and more external parties are accessing our data.

Our perimeter and attack surface have grown immensely, which is why we need to move to zero trust.

We need to reduce the size of the perimeter and reduce the attack surface.

PGP, or Pretty Good Privacy, is a pre-legacy mechanism for secure communications.

This is still relevant within an internal ecosystem.

The problem is when you work with an external party.

For example, an insurance company wants to send a secure email to a client.

How do you see the future of secure access control?

Theres a bit of conversion thats going to happen with authentication vendors and identity management vendors.

just, comment on how to improve this article.