Overview
Technology architecture has undergone a wholesale change to largely distributed and mobile environments. Cloud, SaaS and IoT / OT now dominate the landscape, making traditional security products obsolete.
Acreto SASE+Plus is designed from the ground up to fundamentally solve the problems with traditional security. SASE+Plus introduces multiple innovations such as security Ecosystems, real-time threat learning and A.I. optimization.
Best of all, it’s 100% virtual end-to-end, eliminating the need for products altogether. These advances make SASE+Plus the most advanced, yet simplest security ever.
Get up and running with SASE+Plus in three simple steps.
- Setup Ecosystem Setting up your security Ecosystem only takes a few minutes! Once you register your email, you can name your first Ecosystem and add a few Objects and Policies to get started. You can always add more or modify your configuration at any time.
- Connect
Acreto SASE+Plus is device and network agnostic and supports several methods to connect.
- Thing Connect– Individual devices connect via VPN using its on-board capabilities or you can use the Acreto client.
- Network Connect– Gateway connection for networks using your existing IPSec hardware or the Acreto Virtual Gateway (vGW ).
- Reflection Connect– SASE+Plus operates as a security relay between sources and your remote applications and systems that do not have a connection to Acreto.
- Done
Acreto SASE+Plus Features
Communication
Connectivity
- VPN
- TLS
- IPSec
- Proxy
- Forward Proxy
- Reverse Proxy
- Direct Connect
- 1 Gig Fiber
- 10 Gig Fiber
- MPLS
- Reflection Connect
- Optimized Internet
- Internet Wormholing Networking
Protocol Support
- Network Protocols
- TCP
- UDP
- ICMP
- Network Ports
- 1 – 65535
- Application Protocols
- All major application protocols
- Application Programs
- Over 4,000 Application Program Signatures
Software Defined Perimeter (SDP)
- VPN
- TLS VPN
- IPSec VPN
- Enforcement
- Next-Generation Firewall (NGFW)
- Secure Web Gateway (SWG)
- Cloud Access Security Broker (CASB)
- Zero-Trust
Software Defined WAN (SD-WAN)
- Connectivity
- IPSec
- Direct Connect
- Reflection Connect
- Proxy
- Enforcement
- Next-Generation Firewall (NGFW)
- Secure Web Gateway (SWG)
- Cloud Access Security Broker (CASB)
- Zero-Trust
- Clean Pipe
Converged SD-WAN and SDP
- Connectivity
- TLS VPN
- IPSec VPN
- Direct Connect
- Reflection Connect
- Proxy
- Enforcement
- Next Generation Firewall (NGFW)
- Secure Web Gateway (SWG)
- Cloud Access Security Broker (CASB)
- Zero-Trust
- Clean Pipe
Security
Next Generation Firewall (NGFW)
- Access Controls
- Network Service Control
- Application Protocol Control
- Application Program Control
Threat Prevention
- Intrusion Prevention
- Anti-Malware
- Anti-virus
- Anti-Spyware
- Anti-Ransomware
- Anti-BotNET
- Anti-Exploit
Threat Protection Methods
- Signature
- Sandboxing
- Threat Intelligence
Secure Web Gateway (SWG)
Access Controls
- URL Filtering
- File type Blocking
- Data Leak Prevention Light (DLP)
- Custom Data Pattern Filtering
Zero-Trust
- Ecosystem Security
- Isolation and Security Per Application
- Nano-Segmentation
- Individual isolation and security for each Ecosystem Member
- Attack Surface Reduction
- Reduce attack surface for distributed technlogies
- Dedicated Security Infrastructure
- Per application dedicated security infrastructure
Clean Pipe
- Direct Connect
- Virtual Clean Pipe
Cloud Access Security Broker (CASB)
- AWS
- Azure Google Cloud
- Salesforce
- Office365
Identity
- Device Identity & Verification
- User Identity & Verification
Privacy
- SSL/TLS Decrypt, Scan & Re-encrypt
- SSL TLS Decrypt, Scan & Offload
Address Translation
- Source NAT & PAT
- Destination NAT & PAT
- Reflection NAT & PAT
- Port Forwarding
Logging
- Remote real-time Encrypted Log feed
- Cloud Bucket
Governance & Compliance
- Dedicated & Isolated Per Application Security Infrastructure
- Isolated Per Application Change Management
Redundancy
- Geo-Diverse N+1 Security Points
- Simultaneous Geo-Diverse Connections
Details
The Ultimate Consolidation
One security for all your Clouds, SaaS, networks, devices and IoT/OT.
100% Virtual End-to-End
Security without hardware, licensing or logistics to remotely secure anything, anywhere.
Unburden Your Team
Get out of the product and vendor housekeeping business.
Security Without Knobs & Switches
Fully integrated platform without the integration that makes security complex.
All The Security You Need
Integrates all the security fundamentals:
Access & Application Controls
Threat Prevention
Content Control
Identity
Encryption & Privacy
360° Security
Protects every Network Protocol, Port and Application for bi-directional communications.
Zero-Trust Everything, End-to-End
Patented Nano-Segmentation goes beyond Zero-Trust to isolate and secure each technology individually.
Consistent Security
Uniform security for your different devices, applications, networks, clouds and SaaS.
Bridging The IT and OT Divide
Ecosystems and Nano-Segmentation isolate and protect IoT/OT elegantly.
Never Upgrade Again
Security for the long-haul that’s always current and adapts to the ever-changing threat landscape.
Adaptive Feature Set
Acret-OS' purpose-built security operating system is designed for real-time feature updates on-the-fly.
Network Agnostic
Connect using any type of network from anywhere in the world.
Images
End users are viewing your products!
Make sure they have all the information they need.
If you own this product, sign in to complete this sectionVideos
Sorry, you must be logged in to view the rest of this page
Please log in or create an account to view more details.
Log in or Sign UpCustomers and Partners
Documents
Sorry, you must be logged in to view the rest of this page
Please log in or create an account to view more details.
Log in or Sign UpExpert Analysis
Sorry, you must be logged in to view the rest of this page
Please log in or create an account to view more details.
Log in or Sign Up