| Developers: | BI.Zone (Safe Information Zone, Bison) |
| Date of the premiere of the system: | 2025/08/26 |
| Branches: | Information security |
| Technology: | Mobile Device Management (MDM), IS - Firewalls |
The main articles are:
2025: Presentation of BI.Zone ZTNA
BI.ZONE introduced the BI. ZONE ZTNA solution on August 26, 2025.
It is designed to protect the remote access of employees and contractors to internal corporate resources and is built on a zero trust model.
The number of employees and contractors working remotely continues to grow. Attackers are betting on this. According to BI.ZONE, legitimate accounts (for example, company employees) are used in 27% of cyber attacks, and the share of attacks through contractors is 5% of the total number of cases. In some industries, this figure is even higher: for example, 16% of all cyber attacks on state organizations are committed through contractors. All this leaves organizations with the need to provide remote access to internal systems, while ensuring a high level of security for their corporate infrastructure.
This task allows you to solve BI.ZONE Zero Trust Network Access (BI. ZONE ZTNA). With it, you can conduct a thorough check of the user and device and, based on its results, provide granular access to those segments of the corporate network that are necessary for the work of this particular employee or contractor representative. During the check, the device meets the security requirements of the organization: the presence of antivirus, the operation of the firewall, the relevance of updates, disk encryption and other parameters. If the device meets all the necessary criteria, a secure tunnel is installed to the desired resource using the Ru-WireGuard protocol developed by BI.ZONE. In case of non-compliance with policies, access is blocked or limited.
The solution provides connectivity to corporate network resources using identity firewall, a technology that uses user and group data to enforce network access policies. The network infrastructure is administered using SD-WAN technology. This provides centralized and scalable management of VPN gateways. Security policies are built and monitored through a management server based on EDR (endpoint detection and response) technology.
Шаблон:Quote 'author=noted Ivan Rogalev, head of BI. ZONE ZTNA.
BI. ZONE ZTNA can be used on both corporate and personal devices of users. The latter is relevant for companies practicing the principle of BYOD (bring your own device), which allows employees to use their own devices for work.
BI. ZONE ZTNA use a single agent that can be extended by BI. ZONE EDR modules to protect endpoints, detect vulnerabilities and error configurations, software and the Deception module to control fake objects (decoys). The Deception module allows, already at the reconnaissance stage, to detect even an advanced attacker who can bypass the detection mechanisms.
At launch, the solution supports workstations managed by Windows and. In the macOS future, it is planned to add support for distributions based on, Linux as well as mobile operating systems and. iOS Android

