Flat Preloader Icon
Acreto new logo

Sign In

What is an
Acreto Ecosystem?

An Ecosystem is a dedicated security infrastructure for each application, use-case, project, department or third-party. Ecosystems isolate and secure Ecosystem members that are users, devices, systems and applications that need to interoperate. Anything else won’t even know that the Ecosystem exists -- even if they are on the same network.

You can buy, implement, integrate, operationalize, and manage all these one-off products over a few years.

Next Generation Firewall (NGFW)

Next Generation
Firewall (NGFW)

SWG

Secure Web
Gateway (SWG)

ZTNA

Zero-Trust
Network Access

Segmentation

Segmentation

AS

Application
Security

SWH

SD-WAN Hub

NAC

Network Access
Control (NAC)

IOT

IoT / IoMD
Security

OR

Deploy Acreto Ecosystems that enable these capabilities, plus advanced segmentation and isolation, in just a few hours!

Acreto
OR

What are the advantages
of Ecosystems?

The way organizations use technology is very different today. Technologies are more distributed and diverse than ever, especially purpose-built Operationalized Technologies (OT).

Security budgets are bigger than ever, yet cyber incidents continue to rise. Traditional security requires many expensive one-off tools that create complexity, burden teams and deliver hap-hazard security.

Acreto’s highly differentiated Ecosystem model advances security deployment from per organization to per application dedicated security. This approach is not only significantly more effective, it is also simpler and more affordable.

Acreto Benefits

Per Application Security Icon

Per Application Security

Visibility and access is limited to only users, devices, systems and applications that need to interoperate. Other systems won’t even know that these systems exist.

Any Technology, On Any network, Anywhere Icon

Any Technology, On Any Network, Anywhere

One platform secures all of your distributed and diverse technologies, offering the flexibility to easily adapt to changes in requirements and infrastructure instantly.

Super Simple Icon

Super Simple

Patented AI technology provisions in minutes and fully deploys in 2-4 hours. One centralized management pane to control all your local and distributed technologies.

End-to-End Security Icon

End-to-End Security

A single platform secures all access (devices, sites, IoTs) and application delivery (Servers, Clouds, SaaS) infrastructure components end-to-end.

Consistent Security For Everything, Everywhere Icon

Consistent Security For Everything, Everywhere

For the first time ever, you can have uniform and consistent security for all your technologies.

No More Update Or Upgrades Icon

No More Update Or Upgrades

Acreto does not depend on or require products to function, but does work transparently with any network or security technology already implemented.

Isolation, Segmentation & Containment Icon

Isolation, Segmentation & Containment

Acreto offers four layers of isolation, segmentation and containment for technologies and data-flows - without products or re-architecture.

Sustainably Secure Icon

Sustainably Secure

Minimize change-management to Ecosystem members only – not the entire organization. Self-cleans policies automatically when applications are decommissioned.

How do Ecosystems
Work?

Rather than implementing one-off security products everywhere, simply connect the assets you want to protect to one or more Ecosystems. All the security functionalities are immediately available.
In order for any asset to become a member of the Ecosystem, Acreto implements a Identify, Connect, Isolate and Protect process.

How do ecosystem work

01

Identify

Identity- User or Device identity is validated. MFA and PAM are enabled.

02

Connect

Once Identified, the asset is connected to one or more authorized Ecosystems as a member.

03

Isolate

Each Ecosystem member is isolated from other Ecosystem members and non-members alike.

04

Protect

Full inline controls, including access, application and content controls as well as robust threat and intrusion prevention.

What can
Ecosystems Secure?

Any Technology, On Any Network, Anywhere.

01

Access Technologies

Devices

Devices

Computer (Org Owned or BYOD)

Mobile Phone / Tablet (Org Owned or BYOD)

offices

Offices

Headquarters

Branch

Small Office / Home Offices

Third Parties

Third Parties

Offices

Devices

Remote Users

IoT

Internet of Things (IoT)

ATMs / ITMs

Fire Safety

Elevator Controls

Many more…

Smart TV

HVAC

Many more…

IoMd

Internet of Medical Devices (IoMD)

Imaging System / PACS

Patient Systems

X-Ray

MRI

PACS Storage

Cat Scan

Radiology Station

Cat Scan

Patient Monitor

Infusion Pumps

Patient Systems

MRI

Radiology Station

Ventilators

Defibrulators

Patient Monitor

Ventilators

Infusion Pumps

Defibrulators

PACS Storage

Diagnostic / Test Equipment

02

Application Delivery Technologies

A light blue icon of data points connecting with one another.

Data Center / On-Prem

Networks

Virtual Machines

Servers

Containers

A light blue icon of a cloud connecting to different data based end points.

Cloud

Cloud Instances

Cloud VPCs / Cloud Networks

SaaS Platform

SaaS Platforms

SaaS

Third-Party Applications

Connectivity Methods

Acreto offers a variety of ways to connect your Access or Application Delivery technologies. Depending on the customer use-case and requirements, one, some or all of these methods may be utilized to facilitate end-to-end security.

Embedded OpenSource

Standardized Technologies

Standardized Technologies

TLS VPN

IPSec VPN

Wireguard VPN

OpenWRT

Acreto Specific Methods

Acreto Specific Methods

Acreto Specific Methods

Acreto Direct Connect (HyperScale, 1Gbps - 100Gbps)

Acreto Client Connect

Acreto vGateway (vGW)

A blue hand with a finger touching a screen showing touchless methods.

Touch-less Methods

Touch-less Methods

Reflection Connection

Acreto Client-Less Connect

Ecosystem
Supported Data Flows

Acreto supports all possible data-flow models to address all use-cases for end-to-end interconnection and security.

Acreto Features

Ecosystem Security Isolation

Ecosystem Security Isolation

Ecosystems deliver a dedicated security infrastructure that can be deployed per application, use-case, project, department or third-party. An Ecosystem inherently limits access only to users, devices, systems and applications that need to interoperate together.

Ecosystems support any technology, on any network, anywhere in the world. These include computers, mobile devices, IoTs, Offices, Clouds, SaaS and Data Centers.

Ecosystems can be configured as:
Open → With inbound or outbound access from or to the Internet or a third-party
Closed → Fully contained with access limited to Ecosystem members
Hybrid → Where some systems have inbound or outbound Internet access while others operate fully contained.

Eliminate the Internet Attack Surface

Eliminate the Internet Attack Surface

Eliminates any and all access from the Internet while Ecosystem members can interoperate with authorized systems and applications.

A light blue icon of a an opened lock.

Eliminate the Internet Attack Surface

Ecosystems can easily isolate individual or groups of systems on a shared network or entire networks, to limit access only to systems that need to interoperate together. This is done with

Micro-Segmentation

Segmenting groups of systems on any shared network, including hostile networks or the entire network.

Nano-Segmentation / NAC

Isolating an individual system, device or application to limit access only to other authorized Ecosystem members.

Isolated Data Flows

Isolated Data Flows

Isolated data flows can be defined between two Ecosystem members to limit access to specified sources and destinations, network protocols and ports, application protocols as well as application programs.

Secure Scan addresses a key weakness in many security tools today. 90%+ of all communications is encrypted, yet only 10% of organizations have the means to secure these communications. Encrypted Secure Scan decrypts, scans, and re-encrypts communications inline and in real-time.

Any malicious content embedded in the encrypted payload is blocked, otherwise the clean and validated communication is delivered to its final destination.

Support for IPv4 and IPv6

Access Control

Access Control

Identity with MFA

Identity with MFA

User Control - Authorizes access to the Ecosystem by a user’s identity, including MFA, as authenticated by the organizations Directory Services such as Active Directory or LDAP, as well as third-party Identity Service Providers such as Okta, Ping, Duo, and CloudJump among others.

Device Control - Specifies a unique identity to each device to validate that a specified device that does not rely on a user to operate – such as an autonomous application or IoT, is allowed to join the Ecosystem.

Network Protocol : Port

Network Protocol / Port

Control the network protocol (TCP, UDP, ICMP) and Port (1-65535) any Ecosystem member can use to communicate with any other Ecosystem member or Internet resource by IP, user or device identity. Both inbound and outbound Internet flows are supported.

Application Protocol

Application Protocol

Control the application protocol (HTTP, DNS, SMTP, SMB, etc…) any Ecosystem member can use to communicate with any other Ecosystem members or Internet resource by IP, user or device identity. Both inbound and outbound Internet flows are supported.

Application Program

Application Program

Control the application program (MS-Exchange, Oracle, Facebook, GMail, etc…) any Ecosystem member can use to communicate with any other Ecosystem members or Internet resource by IP, user or device identity. Both inbound and outbound Internet flows are supported.

Content Control

Content Control

Content Category

Content Category

Control communication based on content categories such as Adult, Gambling, Politics, Malware sites among 90+ category options.

File Type Upload : Download Controls

File Type Upload / Download Controls

Control upload / download of files by type such .EXE, PDF, XLS, DOC, SCR, and MSI among hundreds of options.

An icon with an exclamation point in the center showing data leak protection.

Data Leak Prevention

Prevent data leaks by identifying and mitigating the upload or download of sensitive data such as:

  • Credit Cards Upload / Download Controls
  • Social Security Number Upload / Download Controls
  • RegEx Pattern Upload / Download Controls

After verification of network protocol, port, application protocol and application program, a deep inspection is performed on all communications. The effectiveness of this method is amplified by inline Encrypted Secure Scan. Threat prevention capabilities utilize two key methods:

Threat Signature

Threat Signature

Identifies and mitigates known bad exploits, malware, botnets and ransomware.

Zero-Day Behavioral Analysis

Zero-Day Behavioral Analysis

Looks for behavioral indication of threats based on how system functions react to the payload, immediately and over time.

Ecosystem NAT

Ecosystem NAT

Utilized when multiple connect sites are using the same IP address such as with acquisitions or organizational roll-ups.

Reflection NAT

Reflection NAT

Enables implementation of security and controls on Internet-based assets such as a hosted application or SaaS, where direct control is not possible or easily achievable.

Source : Destination NAT

Source / Destination NAT

Traditional in-bound and out-bound NAT

Port Forwarding

Port Forwarding

Port redirection based on NAT policies

Mapped / Allocated IP

Mapped / Allocated IP

Dedicated public IP address allocated to a system or application.

Shared IP

Shared IP

Utilized when a single IP is utilized for multiple use-cases based on the NAT policies.

Real-time dashboard

Real-time dashboard

The Acreto Real-Time dashboard provides visibility into utilization and security events along with a threat index score.

Dashboard Image

Threat Index At-a-Glance Security Status View

Real-time Log Feed

Real-time Log Feed

Real-time Threat Elimination

Real-time Threat Elimination

Why Industry Experts, Insurance Carriers and Customers Trust Acreto

Dealing with Incident Response Issue?

Fast Track Deployment