Cognitive Trust is a cloud-native and cloud-delivered solution for identity-based segmentation and least privilege access of users, applications, and devices (managed and unmanaged), on-prem, and in the cloud.
The solution delivers frictionless, centrally-managed, and software-defined zero trust access security to effectively and efficiently protect operational technology (OT, IIoT), clinical devices (IoMT), and patient information from lateral movement of ransomware payloads, advanced persistent threats, and insider threats.
“Within 24 hours of deploying Elisity Cognitive Trust on our Cisco Catalyst switches, we discovered devices of which we had no prior visibility, giving us insights into actions needed. With help from the Elisity team, we created simple and scalable policies to secure our assets, and we were able to enforce them in real-time. The potential of gaining East-West security for managed and unmanaged users and clinical devices without additional hardware in our campus network is absolutely game-changing for our organization.”
Business Information Security Officer
The solution architecture can leverage pre-existing investments in Cisco, Dell, Extreme, and other vendor switches, by turning them into intelligent policy enforcement points with the use of containers, and makes use of hypervisors where edge computing is not available.
Cognitive Trust passively gleans and continuously verifies the identity of users, applications, OT, IoT, IoMT, and IT devices traversing the network, to enforce policies as close to the assets as possible. It integrates with user, application, and device identity sources so organizations can very quickly gain visibility into network assets and traffic flows, assess risks, and begin building policies, enforced at OSI L2/L3/L4, to secure healthcare resources from malicious network traffic.
Example: Medigate by Claroty integration