top of page

IAP, Identity Aware Proxy

IAP is a gateway that provides secure access to enterprise resources (web applications) using user and device identity information.

To dynamically allow or deny access to specific resources, IAP evaluates user and device context along with policies.

main_visual.png

Enhanced user authentication and role-based access authorization for achieving zero-trust security.

Identity-Centric Access Control

Dynamic access control based on user identity and context is possible.

VPN Replacement

Provides a simpler and more efficient remote access alternative to traditional VPNs.

User and Context-Based Policy Evaluation

Real-time evaluation of user and device status to make access decisions.

*Conditional Adaptive Policies to

Achieve 'Zero Trust Architecture'

IAP operates in accordance with the core principles of the Zero Trust security model. These principles assume a lack of trust in all access requests, whether within internal or external networks. IAP verifies all access requests and provides dynamic access control based on user identity and context.

SDP : Software Defined Perimeter

IAP : Identity Aware Proxy

RBI : Remote Browser Isolation

Zero Trust Implementation Technology Comparison Table

table_eng.png

*Conditional Adaptive Policy (CAP):

Continuously verifies authentication and permissions for all untrusted access.

Realizing Zero Trust through IAP + RBI Converged Technology

cnt_img_eng.png

No separate program

installation required

•No need to install security programs

•Use with a regular browser

Traceless Usage

Conditional Adaptive Security Policies

•Security operations
based on Zero Trust

•Flexible security policies
based on usage conditions

•Continuous verification of
each connection session

Enhanced User Authentication

IP/Network Connection Information Concealment

No modification to existing business system

•Dual network concealment

with RBI and IAP

Upload/

Download File Control

Web Security

•No program installation

•No cookies, temporary file storage

•Block file downloads

•Adaptive policies based on connection location and time

•Additional authentication requirements (OTP, biometric authentication)

•Password reset requests

•CDR for uploads Encryption
for downloads

•Antivirus scanning

•Personal information inspection

•Screen marking

•Capture prevention

•Temporary file deletion

•Source code blocking

bottom of page