BeyondCorp-as-a-service

Luminate's agentless platform provides Zero Trust secured access architecture to all corporate resources and applications, on demand.

Make sure your corporate access pillars are in place to create
Zero Trust architecture:

  • No network
    exposure

  • Complete isolation of applications

  • Pre-authentication and
    pre-authorization

  • Full visibility into user activity

Leveraging Software Defined Perimeter principles

Luminate shifts access control from the network perimeter to individual devices, users, and applications. All corporate resources are cloaked from external networks. The user first undergoes authentication, and if required, posture validation of the accessing device. Then, a flexible, risk score-based engine authorizes application-level access that does not expose the corporate network – even to authorized users.

Protecting applications with brokered trust

Luminate connects applications to trusted users – instead of connecting users to applications. Applications are never exposed to users or external networks, creating a reliable Zero-Trust Architecture, on-premises and in the cloud.

Secured point-to-point access

Product features

  • Security delivered as a service
  • Agentless security
  • Complete isolation
  • Ephemeral connectivity
  • Full visibility
  • Enterprise-grade architecture
  • Open API/infrastructure as code (IAC) support
  • Chat-ops
Security delivered as a service

The Luminate Secure Access Cloud can be set up in three minutes. It does not require deployment or maintenance of any security gateways or endpoint agents, nor does it require changes to existing security configurations.

Agentless security

Authorized users can connect to applications from anywhere in the world, using any device, either on-premises or in a private or public cloud.

Complete isolation

Luminate’s application-level access technology eliminates the need to open direct network communication between end-user devices and data center, eliminating the risk of network-based attacks.

Ephemeral connectivity

Only when a user is authenticated and authorized will Luminate create the secure connection between the application and the user. This connection is ephemeral and automatically terminates once the users complete sessions on the relevant application. This blocks any lateral movements to other applications or network resources.

Full visibility

Connections between applications and users take place on the application level (OSI Layer 7).
All user activities are automatically logged and can be viewed and monitored for security and audit purposes.

Enterprise-grade architecture

Luminate connects to existing IT security infrastructure and processes, such as IdP, MFA, SIEM; automation and orchestration solutions, and is compliant with IT security and service management standards, including SOC 2 Type II and ISO 27001.

Open API/infrastructure as code (IAC) support

Luminate is 100% Software-Defined and API Driven. It can be easily integrated into any CI/CD pipeline based on any infrastructure. Luminate can be easily automated by any Configuration Management or Infrastructure-as-Code tools.

Chat-ops

Luminate connects to corporate messaging systems, providing instant alerts on access request denials and anomalies in application usage, as well as involving users in near real-time decisions for access operations.

Benefits

  • Easy deployment No need to deploy or manage physical or virtual appliances – Luminate is agentless and supports all endpoint and mobile devices. Users and applications can be added quickly in a self-explanatory process requiring just a few clicks, saving hours of IT staff time.
  • Native user experience Applications are delivered with a unified, cloud-native user experience – creating a modernized workspace that supports cloud adoption.
  • Cloud-native elasticity and scalability Luminate scales to an unlimited number of users and applications, without the need to purchase additional appliances. Enterprises can dynamically scale usage up or down, automatically adding or removing users, applications, and datacenters to meet business demands.
  • Zero Trust, total visibility Luminate takes the Zero Trust approach one step further by remaining in the data plane and providing full visibility, governance, and contextual enforcement for user actions. Every operation is monitored and logged, ensuring a detailed audit trail of user activity. All activities are analyzed against company policies, triggering automatic actions to ensure security enforcement and prevent unauthorized access.
  • Single security stack No matter where corporate resources are hosted, whether on-premises or in the cloud, you can manage security policies on a single dashboard and apply a consistent security stack to all of them.
Easy deployment

No need to deploy or manage physical or virtual appliances – Luminate is agentless and supports all endpoint and mobile devices. Users and applications can be added quickly in a self-explanatory process requiring just a few clicks, saving hours of IT staff time.

Native user experience

Applications are delivered with a unified, cloud-native user experience – creating a modernized workspace that supports cloud adoption.

Cloud-native elasticity and scalability

Luminate scales to an unlimited number of users and applications, without the need to purchase additional appliances. Enterprises can dynamically scale usage up or down, automatically adding or removing users, applications, and datacenters to meet business demands.

Zero Trust, total visibility

Luminate takes the Zero Trust approach one step further by remaining in the data plane and providing full visibility, governance, and contextual enforcement for user actions. Every operation is monitored and logged, ensuring a detailed audit trail of user activity. All activities are analyzed against company policies, triggering automatic actions to ensure security enforcement and prevent unauthorized access.

Single security stack

No matter where corporate resources are hosted, whether on-premises or in the cloud, you can manage security policies on a single dashboard and apply a consistent security stack to all of them.

Get Luminate up and running in no time.

  • No architectural changes

  • No additional software requirements on end-user devices

  • No security configuration changes

Try Luminate on your own application

Get a full proof of concept on your own cloud.

Get started immediately.

Any application, anywhere

With Luminate, organizations gain the freedom to host corporate applications in hybrid cloud datacenters, with the same security stack and consistent cloud-native experience.