Blog Details

  • Home
  • How a leading MSP delivers secure monitoring with TransientAccess ZTNA
Chad loeven January 27, 2021 0 Comments

How a leading MSP delivers secure monitoring with TransientAccess ZTNA

Cyflare’s One Converged Security Platform (formerly SOC In A Box) service deploys managed appliances to end user networks via their channel partners. Cyflare needed a better way than SSH to securely remotely manage the devices.
Secure Access: SSH vs ZTNA

Cyflare has hundreds of appliances deployed to customers globally for remote security monitoring and management services.

While looking for a product to replace the default SSH access for appliance administration, Cyflare found TransientX’s TransientAccess. Cyflare’s goals were to:

  • Implement a zero-trust model
  • Move away from SSH
  • Limit access to only the minimum resources allowed to the people that needed
  • Reduce support overhead

The default manner of remotely managing the Cyflare appliances was via SSH. This came with a host of usability and security challenges. SSH was complicated to set up securely and manage, hampered by a lack of knowledge by partners and customers.

Now they simply login through the TransientAccess disposable container client. Policies set by Cyflare ensure they have visibility only to the appliances they are allowed to access. Cyflare automated a simple provisioning process that sclaes and enforces the least privilege principal for who can access what.

Moving to TranstientAccess allowed us to focus more on our core services and worry less about the risk of a breach. Implementation of the solution is simple and requires no involvement from our customers. We practice what we preach, delivering for our customers a security management and monitoring solution that is itself truly secure from end to end. “ -Evan Hausle, Director of Sales Engineering

As part of their search for a solution, Cyflare explored how they could implement true Zero Trust Network Access.  Moving to VPNs were not an option as that would have created a whole new set of security issues. As part of the move to ZTNA, Cyflare was able to discontinue some legacy VPNs in place for other uses.

ZTNA Solution Evaluation: Transient Access

They evaluated other ZTNA solutions on the market, but found shortcomings with all the alternatives. Some products were:

  • Cloud-only
  • Passed traffic through their own systems (creating regulatory and compliance issues
  • Limited to only web-based applications.

In addition to the technical advantages of TransientAccess, Cyflare selected TransientX because of the confidence in the team and the level of support they received.

In addition to the requirement of replacing SSH, another requirement for Cyflare was to host their own Controllers in order to deliver flexible provisioning for partners. The ease of deployment and support for different deployment options was another key factor in selecting TransientAccess.

Read the full case study here or contact us to try it out for yourself.

Leave Comment

Egemen Tas

22+ Years of Experience​

As President and Chief Executive Officer of TransientX, Inc., a pioneer in network of applications technology, he is responsible for strategy and day to day operations.​

Before TransientX, he served as Chief Technology Officer at COMODO Cybersecurity, and during his tenure created some of the world’s most disruptive cybersecurity products, including COMODO Endpoint Security, lauded by NSA and Wikileaks as impenetrable.

Egemen is also a noted “white hat” who has been cited in a number of ethical hacking publications and whose tools are still used today in related subject courses around the world, including those offered by the reputable SANS Institute.

He has been recently recognized in the industry as one of the 40 Most Influential Turkish Americans.

Egemen holds a degree in Computer Science from Bogazici University in Istanbul, Turkey.

This will close in 0 seconds

Jeffrey S. Harrell

20+ Years of Experience​

Jeffrey has served as the Company’s Chief Financial Officer and VP of Business Strategy since June 2020.

Previously, he co-founded several technology companies which were subsequently acquired in the semiconductor and software industries. Jeffrey practiced corporate law for more than 20 years.

Jeffrey has a J.D. from the University of Virginia School of Law and a B.S. in accounting and finance from Virginia Tech.

He is also a certified public accountant (Virginia).

This will close in 0 seconds

Selhan Bilsay

20+ Years of Experience​

Selhan is responsible for engineering activities and product development ​

Before joining TransientX, he was the general manager of COMODO’s R&D operations in Turkey. ​

Being one of the leaders who worked in NATO cybersecurity doctrine, he is a seasoned expert in millitary defense industry with more than 15 years experience in the sector.

Selhan holds MBA degree from The Hague University, The Netherlands and BSc degree in Electronics Engineering from Hacettepe University, Ankara-Turkey

This will close in 0 seconds

Chad Loeven

As VP Marketing, Chad Loeven is responsible for all things digital and messaging. Chad has been involved in enterprise security for over 20 years and brings a thorough vision of our industry to the table, making sure our alignment within the industry is perfect.

After having successfully guided Vircom, Sunbelt (acquired by GFI) and Silicium (acquired by RSA), he directed RSA’s strategic partnerships. He most recently headed up VMRay’s U.S. operation, building out the sales, marketing and customer success teams.

This will close in 0 seconds

John Sarina

John is responsible for driving enterprise sales through our channel partners at Transientx.

Prior to Transientx, John has held sales leadership roles for notable startups NetScreen/Juniper, Riverbed, PaloAlto Networks. Johns experience bringing new disruptive technologies to market has yielded over $500 Million in revenue contribution.

This will close in 0 seconds