- Home
- What We Do
Security Intelligence Services
Technical Services
Security Audit Services
- Who We Are
- Resources
- Contact Us
What is Zero Trust Network Access?
Rather than an actual technology, ZTNA is a methodology where you assume that nothing inside or outside your network is trusted. This is a move away from a traditional network where any device on an internal network is thought of as a known and trusted device. The downside to the traditional design is that once an internal device has been compromised, an attacker can freely move laterally, gathering and exfiltrating whatever data they can find.
With a Zero Trust model, you are instead declaring every device and user as untrusted until they have proven otherwise. This then allows access to target devices and network segments to be restricted based on user identity and purpose, ensuring that only the required users are accessing your most critical data.
The SEP2 Solution
The move to a Zero Trust model requires an understanding of where your critical assets are and what protections can be applied to them, sometimes needing a redesign of core security segments. SEP2 have the expertise to aid you with this journey, from initial scope, through design, implementation and then ongoing support. Our experience with complex networks and integrations between multiple solutions allows SEP2 to have a holistic approach to your requirements.
Who we work with
A Zero Trust approach requires both identity providers and security solutions to work harmoniously to ensure users only get access to what they are permitted to. Identity providers such and Okta and Ping allow us to ensure there is robust, policy-driven authentication of users, including multifactor where desired. These identities are then consumed by Check Point or Palo Alto security solutions to provide advanced security screening of connections in and out of your protected segments.
If you are interested in learning more about Zero Trust Network Access (ZTNA) and how SEP2 can help you achieve your cyber security requirements, contact us today.
Why Choose Us
Our values inspire and guide us towards cyber security excellence
SEP2 are cyber-security specialists whose success is built on five values:
Honesty
We have always worked hard to ensure that we are offering an honest and transparent set of solutions to our clients. This means always prioritising the right solutions to our customers.
Committed to Good
SEP2 is an honourable organisation guided by a strong moral compass. We live this value with authenticity; it is not about simply ticking a social responsibility box. We understand that we are on the side of ‘good’ in a continuing war against cyber criminality, and that we have a purpose and duty to perform.
Passion
No matter who you talk to at SEP2, you will find someone truly passionate about the sector that they are working in. We are fanatical about the sector – working in cyber security really means something to each and every one of us.
Tech Driven
Cyber Security is by nature a tech-heavy sector. It is fast-moving and complex. This is why we only partner with vendors that truly understand the sector and have solutions that are tried and tested. We fundamentally believe in our portfolio of vendor solutions.
People Powered
We understand that the tech alone is not going to provide you with the security you need. It is our job to know these solutions inside-out to ensure they are right for your requirements. We understand that we need to listen and be proactive. We live our ‘people powered’ value and have a proud history of investing in apprentices to help us grow.
Every SEP2 colleague lives these values every day. We have a culture of passionate people who work as a team that will never leave a job incomplete.
You're not alone
"SEP2 are technically great"
Riccardo, Project Delivery & Solutions EngineerLondon Borough of Islington
"We have dealt with various Check Point partners in the past, and our best experience has been with SEP2. I have nothing but good things to say about the service provided by SEP2"
Alexander, ICT Technical Projects OfficerNewark and Sherwood District Council
"SEP2 act as partners not simply suppliers"
Keith, Head of Technical ServicesUniversity of the Arts London
"Wingman service has been amazing"
Robert, Information Security ArchitectCancer Research UK (CRUK)
"SEP2...have aligned to our business needs"
Aaron, Network Services ManagerNorfolk and Norwich University Hospitals NHS Foundation Trust
"SEP2 (are) very knowledgeable and helpful"
Pat, Information Security ManagerLondon Borough of Camden
Previous
Next
Tech Driven. People Powered.
Protect your business today
To find out more about how we can secure your organisation against all forms of cyber security attack, get in touch with SEP2 now or sign up to our newsletter.
Looking for a different service or solution?
We offer a number of services and solutions to help protect you and your business. Take a look below at what else we have to offer.