Solution Briefing
Case Study

Solution Briefing

Zero Trust is a modern cybersecurity framework based on the principle: "Never trust, always verify." Unlike traditional security models that assume everything inside a network is safe, Zero Trust treats all users, devices, and applications—whether inside or outside the network—as potential threats. Access is granted only after strict verification, and least-privilege principles are enforced.

Key Features

Verify Explicitly
  • Every access request must be authenticated, authorized, and encrypted.
  • Uses multi-factor authentication (MFA), device health checks, and identity verification.
Least Privilege Access
  • Users and devices get only the minimum access needed—nothing more.
  • Reduces attack surface by limiting lateral movement.
Assume Breach
  • Operates as if threats already exist inside the network.
  • Continuous monitoring and micro-segmentation limit blast radius.
Micro-Segmentation
  • Splits the network into small, isolated zones to prevent lateral movement. Example: A compromised HR system can’t access finance data.
Continuous Monitoring and Analytics
  • Real-time risk assessment using AI/ML to detect anomalies.
  • Automated responses such as revoking access if behavior is suspicious.

Case Study

Enabling Secure Access with Zero Trust for a Chinese Property Developer

Customer Background
  • A leading Chinese property developer with multiple branches in Malaysia required a secure and reliable way to connect staff and systems across countries. Traditional VPN-based remote access posed risks due to credential theft and unauthorized access. To overcome these challenges, the developer sought a Zero Trust approach that enforces strict authentication and access controls.
Challenges
  • Ensuring secure remote access for users connecting from China to Malaysia branches.
  • Preventing unauthorized access to sensitive business systems.
  • Reducing dependency on traditional perimeter-based security methods.
Proposed Solution
  • The company deployed our Zero Trust Network Access (ZTNA) Solution, designed to deliver identity-based, least-privilege access with multi-factor authentication (MFA).
Implementation
  • Deployment: Installed 1 Zero Trust appliance at the HQ to manage secure access.
  • Secure Access: Enabled MFA for all remote connections from China to Malaysia branches.
  • Integration: Integrated the solution with LDAP for centralized identity management and MFA authentication.
  • Full Feature Activation: All Zero Trust modules activated to enforce strict verification before granting access.
Results / Benefits
  • Secure remote connectivity between China HQ and Malaysia branches.
  • Stronger authentication with LDAP-based MFA, reducing risk of credential theft.
  • Improved visibility and control over user access to business systems.
  • Future-ready Zero Trust framework, aligning with global security best practices.
Conclusion
  • By implementing our Zero Trust Solution, the property developer has achieved a secure, identity-driven access framework that protects its cross-border operations. The solution ensures only verified users gain access, safeguarding sensitive data and business systems.