Systancia, recognized as a Representative Vendor of Stand-Alone ZTNA in the Market Guide for Zero Trust Network Access published by Gartner in June 2020. Paris, July 28th, 2020 – Systancia, a French editor of cybersecurity and application virtualization solutions, is listed among the Representative Vendors of Stand-Alone ZTNAZero Trust Network Access. The ZTNA is a name describing products that apply a "Zero Trust", or lesser privilege, policy in the area of external access. The objective is to provide strictly indispensable access to an external user so that he can carry out the necessary tasks within the framework of his work without giving him superfluous rights or access that could represent a risk for the security of the information system. Access policies are defined according to : the identity of the user, possibly reinforced by two-factor authentication mechanisms, its connection conditions, such as its connection location or the health of the terminal used for the connection. The ZTNA makes it possible to give very fine and granular accesses to the information system differentiated according to the user, whether he is an internal teleworker or a service provider. This approach strongly limits the risks of intrusion or infection of the information system.... in the Market Guide for Zero Trust Network Access, published by Gartner in June 2020, recognized for Systancia Gate, its teleworking solution. Access the Gartner Market Guide The best way to access your entire working environment from any place in complete security In its research, the Gartner points out: “The old security model of “inside means trusted” and “outside means untrusted” is broken. When users became mobile and when business partners on the “outside” required access, virtual private networks (VPNs) and demilitarized zones (DMZs) became common. They also granted excessive implicit trust — trust that attackers abused”. ZTNA replaces traditional VPNVirtual Private Network. VPN is a technology that simulates a local area network between two trusted networks. In practice this allows two elements (workstations, servers, printers, etc.) to communicate with each other even though they are not physically located in the same computer network. Since communication between these two networks passes through a public network in most cases, VPNs incorporate security mechanisms to ensure that communication between the two networks cannot be intercepted by a third party to ensure confidentiality. This technology is very practical in the context of companies deployed in several locations that need to share computer resources, such as file sharing. For ease of use, this technology has been adopted by IT departments in cases where teleworking is used by considering the remote user's workstation as an extension of the company's computer network even though this workstation is not part of a trusted network.... technologies providing access to applications. According to Gartner “ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE strategy or to rapidly expand remote access.” Systancia Gate, the Made In France ZTNA solution that eliminates VPN-related risks “In the field of teleworking, the Systancia Gate solution, based on the principle of Zero Trust (ZTNA – Zero Trust Network Access), allows personal desktop to be used to enter the network of organizations (companies, administrations or hospitals). Deployed in just a few hours, Systancia Gate provides several thousand teleworkers with the same working environment as the one used on a daily basis,” explains Christophe Corne, founder and Chairman of Systancia’s Management Board. The Systancia Gate teleworking solution offers an agile user experience (by providing the same working environment as in the office), in complete security. Systancia Gate provides selective and granular access to the resources to which the user is entitled to access. We believe these are the reasons why the French solution has been recognized by Gartner in this report. Systancia Gate allows to: Telework from desktops secured by the company or using your own IT equipmentEliminate the risks associated with the use of VPNAllow service providers to access the company’s information systemGuarantee the traceability of remote access providedEnsure regulatory compliance (GDPR, LPM/NIS, etc.)Migrate applications to the cloudGuarantee business continuity during a crisis context The Systancia Gate solution has been awarded, under its former name “IPdiva Secure”, a certification from the ANSSIAgence Nationale de la Sécurité des Systèmes d’Information. The National Cybersecurity Agency of France (ANSSI) is a French government organisation reporting to the Secretary General for Defence and National Security (SGDSN), who is responsible for advising the Prime Minister in the exercise of his functions in the field of defence and national security. ANSSI is responsible for cybersecurity issues in France. The ANSSI provides its expertise and technical skills to organisations (administrations or companies) with a reinforced mission to the operators of vital importance (OIV), operating in areas of activity that are sensitive for the very integrity of the country and the population (health, regal, economic and technological fields). The scope of the Agency's action concerns the computer population as a whole. In particular, it intervenes in the following areas - monitoring and reacting to any incident relating to cybersecurity, - in the development of products for civil society, - as an information and advisory body, - as a training organisation, - as a reference organisation for the labelling of trusted products and service providers... (National Cybersecurity Agency of France). Thanks to this certification, organizations can be confident in their regulatory compliance. It also offers many other benefits, including: Multi-site and multi-vlan double-barrier architecture (outgoing flows only, no network port opening), with a single access portal to the datacenters that is highly secure.Management of configuration options by granularity, taking into account different access profiles.Transparent workstation compliance monitoring, with strong authenticationPrimary or secondary authentication Authentication allows a user to guarantee his or her identity before accessing a resource or service. Primary authentication will give user access to the workstation (Windows login). Several authentication modes can be made available to users: login and password, smart or contactless cards, biometrics, mobile ... To classify an authentication mode it will be enough to rely on the principles of the 3 factors: "What do I have? ", " What do I know? ", " Who am I? ». The answers provided to these questions make it possible to say for a given authentication method whether it is "simple" or "double" factor. Secondary authentication is the access of a user to an application from an open session on a workstation. The application can be of any type: web, client-server, local to the workstation or external...... (MFA) and integrated SSO in compliance with the Zero trust policy.A protocol break that acts as a shield against the risks of malware, ransomware…. Systancia Gate is available as a software product (acquisition or subscription) and as a cloud service operated by Systancia, rapidly deployable and economically flexible. Gartner “Market Guide for Zero Trust Network Access,” Steve Riley, et al, 8 June 2020 (Gartner subscription required). Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About Systancia At Systancia, we value ingenuity to innovate. We blend application virtualization, cybersecurity and artificial intelligence to create unique, award-winning and certified solutions. Behind every workplace, there is a person who deserves to be empowered and trusted. This is our belief and our goal. This is why hundreds of public and private organizations choose Systancia, to unlock the potential of everyone, in full trust. With all our R&D in France, we sell our application virtualization (VDI)An access window to a remote desktop or applications. The virtualization of desktops or applications consists of displaying applications or a desktop on the user's computer, which are installed or run on a group of machines remote and independent of the user's computer. The user's workstation is thus transformed into a simple access window. This group of machines (virtual or not) can be located in an internal corporate network or in the cloud. In the case of application virtualization, the user sees the virtualized applications on his own desktop like other applications. Virtualized applications are independent of the operating system on the user's desktop. In the case of desktop virtualization (VDI Virtualisation Desktop Infrastructure), it is the user's desktop with its applications that is virtualized. The virtualized desktop or virtualized applications are independent of the user's operating system. The advantages of desktop virtualization include speed of execution (the user benefits from the power of remote machines), ease of use for the administrator who manages as many machines as they wish centrally, enhanced security, excellent overall cost, ease of managing updates, etc...., private access (ZTNA), privileged access management (PAMPrivileged Access Management. PAM is a technology for managing access and authentication of authorized users, usually information system administrators, to administrative resources or applications. The main objective is to secure the information system by removing unauthorized access to sensitive resources. This protection is based on two main axes: management of the injection and life cycle of passwords used in administered resources and administration applications, the traceability of all the actions carried out when connecting users with a power of nuisance on the information system, in the form of audit or video traces. The users with malicious power concerned by the PAM may be internal users of the information system, such as system administrators or users handling sensitive data, as well as external users such as infomanagers or remote maintenance personnel....) and identity and access management (IAM)A set of processes that manage a user's identity on the network. Identity and Access Management (IAM) is the set of processes that manage a user's identity on the network. It includes the following different segments: access management (AM), authentication, privilege account management (PAM), identity administration and governance (IGA). It is generally misused to refer to IGA. The functional scope of IAM is very broad. It will include functionalities allowing - to authenticate a user on the network (primary authentication), - manage its authorizations, the life cycle of its identity and the accounts associated with it, - to guarantee the traceability of his rights, as well as the actions carried out by/on him. To illustrate, the IAM makes it possible to simply assign the rights of a collaborator and to make them evolve according to his current situation. The fact that they belong to the company, and the function that determines their access authorization to certain applications, are taken into account in real time and integrated into the information system.... solutions across the globe, with our valued partners.