Apono and Check Point Software Drive Real-Time Zero Trust Access Integration for Cloud Applications

Apono and Check Point Software: Revolutionizing Security with Real-Time Zero Trust Access



In a significant stride toward enhancing cloud security, Apono has announced a strategic integration with Check Point Software Technologies. This collaboration aims to deliver an innovative approach to Zero Trust access management within SASE (Secure Access Service Edge) environments, effectively bridging long-standing security gaps.

The newly developed solution leverages a Zero Standing Privilege (ZSP) architecture designed to eliminate outdated persistent permissions without compromising on operational agility. Traditionally, organizations relying on SCIM (System for Cross-domain Identity Management) for identity synchronization can face waits of up to 60 minutes, which often leads to excessive standing access being granted as a stopgap.

The Apono-Check Point integration eliminates this dependency. Instead, it enforces temporary, event-driven access, allowing users to receive only the permissions necessary for their specific tasks. This permission is dynamically revoked once the work is completed, effectively minimizing the organization's attack surface.

Ofir Stein, Co-founder and CTO of Apono, stated, “Cloud environments are now operated not only by humans but by automated systems and AI-driven agents. These systems react in milliseconds, and access must follow the same pace.” Through the Apono and Check Point integration, organizations can ensure that access rights align dynamically with their evolving cloud infrastructure.

As enterprises increasingly depend on SASE frameworks to secure remote workforces, traditional provisioning methods often introduce delays and friction, especially during high-stakes situations like incident responses. The joint initiative curtails these stumbling blocks through multiple key improvements:

1. Removal of Persistent Permissions: This enhancement ensures that organizations are not burdened with outdated permissions that can pose security threats.
2. Real-Time Access Controls: The integration facilitates real-time, policy-driven user access without the cumbersome wait times associated with traditional identity management practices.
3. Dynamic Least-Privilege Access: The new approach allows for least-privilege access enforcement to occur at the SASE layer, thereby ensuring security while maintaining operational efficiency.

Amit Bareket, VP of Security Service Edge at Check Point Software, commented on the critical need for this collaboration, emphasizing that organizations are under mounting pressure to implement a robust Zero Trust framework without adversely affecting team productivity. He noted, “With Harmony SASE, our collaboration with Apono extends Zero Trust from identity to Just-In-Time Just-Enough network access enforcement.”

Furthermore, the integration provides a host of capabilities designed to automate and enhance security measures:
  • - Instant Identity Provisioning: Allows for immediate addition or removal of users from Harmony SASE groups, eliminating the delays caused by conventional sync processes.
  • - Policy-Driven Access Control: Guarantees that all access remains temporary and governed by strict policies, automatically expiring once no longer warranted.
  • - Context-Aware Workflows: Access triggers can respond not only to traditional IT requests but also to real-time signals, such as incident acknowledgments and change management events, further streamlining the process.
  • - Rightsizing Enforcement: This feature automatically identifies over-privileged users and provides necessary adjustments to ensure access aligns with the least-privilege framework.

As both Apono and Check Point Software look to the future, they plan to enhance the integration with advanced automation features and broader governance workflows. This vision aligns with a goal of creating a robust, unified Zero Trust architecture, where access is granted only on an as-needed basis and revoked accordingly.

Apono's real-time Just-in-Time access solutions not only bolster security but also facilitate rapid responses across cloud infrastructures, SaaS applications, and operational resources. Companies embracing this integration can enforce a more rigorous Zero Trust policy without hampering the efficiency of their engineering and operational sectors.

In a landscape where rapid technological advancement meets escalating security concerns, this partnership stands out as a beacon of effective and innovative security practices, reflecting a commitment to safeguarding digital environments for the distributed workforce of the future.

Topics Consumer Technology)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.