Overview

Technology architecture has undergone a wholesale change to largely distributed and mobile environments. Cloud, SaaS and IoT / OT now dominate the landscape, making traditional security products obsolete.

Acreto SASE+Plus is designed from the ground up to fundamentally solve the problems with traditional security. SASE+Plus introduces multiple innovations such as security Ecosystems, real-time threat learning and A.I. optimization.

Best of all, it’s 100% virtual end-to-end, eliminating the need for products altogether. These advances make SASE+Plus the most advanced, yet simplest security ever.

Get up and running with SASE+Plus in three simple steps.

  1. Setup Ecosystem Setting up your security Ecosystem only takes a few minutes! Once you register your email, you can name your first Ecosystem and add a few Objects and Policies to get started. You can always add more or modify your configuration at any time.
  1. Connect
    Acreto SASE+Plus is device and network agnostic and supports several methods to connect.
  • Thing Connect– Individual devices connect via VPN using its on-board capabilities or you can use the Acreto client.
  • Network Connect– Gateway connection for networks using your existing IPSec hardware or the Acreto Virtual Gateway (vGW ).
  • Reflection Connect– SASE+Plus operates as a security relay between sources and your remote applications and systems that do not have a connection to Acreto.
  1. Done
Acreto SASE+Plus Features

Communication

Connectivity

  1. VPN
    • TLS
    • IPSec
  2. Proxy
    • Forward Proxy
    • Reverse Proxy
  3. Direct Connect
    • 1 Gig Fiber
    • 10 Gig Fiber
    • MPLS
  4. Reflection Connect
  5. Optimized Internet
    • Internet Wormholing Networking

Protocol Support

  1. Network Protocols
    • TCP
    • UDP
    • ICMP
  2. Network Ports
    • 1 – 65535
  3. Application Protocols
    • All major application protocols
  4. Application Programs
    • Over 4,000 Application Program Signatures

Software Defined Perimeter (SDP)

  1. VPN
    • TLS VPN
    • IPSec VPN
  2. Enforcement
    • Next-Generation Firewall (NGFW)
    • Secure Web Gateway (SWG)
    • Cloud Access Security Broker (CASB)
    • Zero-Trust

Software Defined WAN (SD-WAN)

  1. Connectivity
    • IPSec
    • Direct Connect
    • Reflection Connect
    • Proxy
  2. Enforcement
    • Next-Generation Firewall (NGFW)
    • Secure Web Gateway (SWG)
    • Cloud Access Security Broker (CASB)
    • Zero-Trust
    • Clean Pipe

Converged SD-WAN and SDP

  1. Connectivity
    • TLS VPN
    • IPSec VPN
    • Direct Connect
    • Reflection Connect
    • Proxy
  2. Enforcement
    • Next Generation Firewall (NGFW)
    • Secure Web Gateway (SWG)
    • Cloud Access Security Broker (CASB)
    • Zero-Trust
    • Clean Pipe

Security

Next Generation Firewall (NGFW)

  • Access Controls
    • Network Service Control
    • Application Protocol Control
    • Application Program Control

Threat Prevention

  • Intrusion Prevention
  • Anti-Malware
  • Anti-virus
  • Anti-Spyware
  • Anti-Ransomware
  • Anti-BotNET
  • Anti-Exploit

Threat Protection Methods

  • Signature
  • Sandboxing
  • Threat Intelligence

Secure Web Gateway (SWG)

Access Controls

  • URL Filtering
  • File type Blocking
  • Data Leak Prevention Light (DLP)
  • Custom Data Pattern Filtering

Zero-Trust

  1. Ecosystem Security
    • Isolation and Security Per Application
  2. Nano-Segmentation
    • Individual isolation and security for each Ecosystem Member
  3. Attack Surface Reduction
    • Reduce attack surface for distributed technlogies
  4. Dedicated Security Infrastructure
    • Per application dedicated security infrastructure

Clean Pipe

  • Direct Connect
  • Virtual Clean Pipe

Cloud Access Security Broker (CASB)

  • AWS
  • Azure Google Cloud
  • Salesforce
  • Office365

Identity

  • Device Identity & Verification
  • User Identity & Verification

Privacy

  • SSL/TLS Decrypt, Scan & Re-encrypt
  • SSL TLS Decrypt, Scan & Offload

Address Translation

  • Source NAT & PAT
  • Destination NAT & PAT
  • Reflection NAT & PAT
  • Port Forwarding

Logging

  • Remote real-time Encrypted Log feed
  • Cloud Bucket

Governance & Compliance

  • Dedicated & Isolated Per Application Security Infrastructure
  • Isolated Per Application Change Management

Redundancy

  • Geo-Diverse N+1 Security Points
  • Simultaneous Geo-Diverse Connections

Details

The Ultimate Consolidation

One security for all your Clouds, SaaS, networks, devices and IoT/OT.

100% Virtual End-to-End

Security without hardware, licensing or logistics to remotely secure anything, anywhere.

Unburden Your Team

Get out of the product and vendor housekeeping business.

Security Without Knobs & Switches

Fully integrated platform without the integration that makes security complex.

All The Security You Need

Integrates all the security fundamentals:
Access & Application Controls
Threat Prevention
Content Control
Identity
Encryption & Privacy

360° Security

Protects every Network Protocol, Port and Application for bi-directional communications.

Zero-Trust Everything, End-to-End

Patented Nano-Segmentation goes beyond Zero-Trust to isolate and secure each technology individually.

Consistent Security

Uniform security for your different devices, applications, networks, clouds and SaaS.

Bridging The IT and OT Divide

Ecosystems and Nano-Segmentation isolate and protect IoT/OT elegantly.

Never Upgrade Again

Security for the long-haul that’s always current and adapts to the ever-changing threat landscape.

Adaptive Feature Set

Acret-OS' purpose-built security operating system is designed for real-time feature updates on-the-fly.

Network Agnostic

Connect using any type of network from anywhere in the world.

Images

End users are viewing your products!

Make sure they have all the information they need.

If you own this product, sign in to complete this section

Videos

Sorry, you must be logged in to view the rest of this page

Please log in or create an account to view more details.

Customers and Partners

Documents

Sorry, you must be logged in to view the rest of this page

Please log in or create an account to view more details.

Expert Analysis

Sorry, you must be logged in to view the rest of this page

Please log in or create an account to view more details.

Expert Analysis

"Acreto solves the difficult challenges of securing hybrid infrastructure end-to-end. They even solve problems some don’t realize they have, especially around IoT, Operationalized Technologies and multi-owner systems. The fact that Acreto does this completely virtually, without the need for any products, is a big advantage."

- Bob Flores

Former CTO, CIA

View All Expert Reviews
Apply to Review
Compare items
  • Total (0)
Compare
0

Shopping cart

Coming Soon!

This resource is not yet available!

Ok

Coming Soon!

The Events Resource will launch in June.

Ok

Coming Soon!

The Events Resource will launch in May.

Ok

Coming Soon!

The Grants Resource will launch in 2022.

Ok

Coming Soon!

The Innovation Opportunities Resource will launch in 2022.

Ok

Coming Soon!

The Venture Capital (VC’s) Resource will launch in 2022.

Ok

Applications for Phase 1 closed on March 21st

If you have questions about the phase 1 application, please email [email protected] .

Ok

Coming Soon!

The Grant Portal Resource will launch in 2022.

Ok

Coming Soon!

The Innovation Hq Resource will launch in August.

Ok

Coming Soon!

The Pilot Applications Resource will launch in 2022.

Ok

Product Builder

Innovators can add important details about their products, using the product builder, that will help end-users on the R2 Network identify their solutions and understand fit.

Ok

R2 Learn

Resources to educate Entrepreneurs and First Responders on the unique challenges and opportunities in the public safety market. Search for courses, customize your library or add a course below.

Ok

Events

In-person and online opportunities to engage with the public safety community around what's new in response and resiliency technology.

Ok

Product Finder

First responders and public safety agencies can use the product finder to identify the technology solutions their agency needs to address response and resiliency challenges.

Ok

Grant Portal

Public safety agencies will be able to use the Grant Portal to identify the grants they qualify to procure needed technology and resources. Entrepreneurs can use the grant portal to find funding to support the development of their technology.

Ok

Venture Capital

Finding investors to support start-ups in the public safety market is a huge challenge. A growing list of institutions and individuals are helping to meet the critical need. This resource will help connect funding sources with venture-ready public safety technology companies.

Ok

RFP Finders

Navigating the complex RFP world is a difficult process for most startups. The RFP Finder will help innovators identify qualifying procurement opportunities.

Ok

Innovation Opportunities

Programs and challenges designed to help promote and support the growth of public safety innovation. Stakeholders can add opportunities and recruit participants, while innovators will be able to apply in just a few clicks.

Ok

Celebrating 1 Year of the R2 Network

We'll celebrate the formal launch of the R2 Network with an eye towards the future. We will highlight what's to come from the Network designed to enable innovators and support end-users of the public safety industry.

Ok

Stakeholder User Group

Stakeholders are the backbone of the public safety industry. Federal agencies, associations, distributors, corporations, and other service providers play a vital role in the innovation ecosystem. We're launching a dedicated Stakeholder user group in the R2 Portal to help streamline Stakeholder interaction on the Portal with admin like abilities to create programs, events, content, and even products. Stay tuned for continued feature releases to improve stakeholder functions through 2022.

Ok