1. ACCESS CONTROL
A Network Access Control (NAC) process adds user and device access control policies to the network.
Policies can be based on user and/or device authentication and the state of the endpoint configuration.
2. TRUST ACCESS TO THE NETWORK
ZTNA (Zero Trust Network Access) is an IT security architecture that provides secure remote access to an organization’s applications, data and services based on clearly defined access control policies.
3. CLOUD ACCESS SECURITY BROKER
A cloud access security broker (CASB) is a point of enforcement of security policy on-premises or in the cloud. It stands between consumers and cloud service providers to combine and enforce corporate security policies.
4. GATEWAY WEB SICURI
A secure web gateway is a solution that filters malware and unwanted software from user-initiated web/internet traffic and ensures compliance with corporate and regulatory policies.