Identity-Centric Access Control
Dynamic access control based on user identity and context is possible.
VPN Replacement
Provides a simpler and more efficient remote access alternative to traditional VPNs.
User and Context-Based Policy Evaluation
Real-time evaluation of user and device status to make access decisions.
*Conditional Adaptive Policies to
Achieve 'Zero Trust Architecture'
IAP operates in accordance with the core principles of the Zero Trust security model. These principles assume a lack of trust in all access requests, whether within internal or external networks. IAP verifies all access requests and provides dynamic access control based on user identity and context.
SDP : Software Defined Perimeter
IAP : Identity Aware Proxy
RBI : Remote Browser Isolation
Zero Trust Implementation Technology Comparison Table
*Conditional Adaptive Policy (CAP):
Continuously verifies authentication and permissions for all untrusted access.
Realizing Zero Trust through IAP + RBI Converged Technology
No separate program
installation required
•No need to install security programs
•Use with a regular browser
Traceless Usage
•No program installation
•No cookies, temporary file storage
•Block file downloads
Conditional Adaptive Security Policies
•Security operations
based on Zero Trust
•Flexible security policies
based on usage conditions
•Continuous verification of
each connection session
Enhanced User Authentication
•Adaptive policies based on connection location and time
•Additional authentication requirements (OTP, biometric authentication)
•Password reset requests
IP/Network Connection Information Concealment
No modification to existing business system
•Dual network concealment
with RBI and IAP
Upload/
Download File Control
Web Security
•CDR for uploads Encryption
for downloads
•Antivirus scanning
•Personal information inspection
•Screen marking
•Capture prevention
•Temporary file deletion
•Source code blocking