Fine-grained policies & controls

Service-layer authorization for Users and Applications

Banyan enforces fine-grained, access control at the request & resource level for Layer-7 protocols (e.g, HTTP, MySQL, Kafka).

Network-level mechanisms using IP address and port only provide coarse-grained reachability guarantees which are inadequate to protect modern applications.

Banyan's real-time event logs capture unauthorized accesses for audit and forensics.

Transparent TLS encryption

Banyan enables incremental roll-out of mutually-authenticated TLS encryption between applications without any changes to code or infrastructure.

Banyan automatically manages certificates and keys in multi-cloud environments.

Banyan helps organizations achieve compliance related to data-in-motion encryption.

Identity-based segmentation

Banyan automatically assigns cryptographic identities to every workload, device, and user in your environment.

These unique identities enable cross-cloud and cross-cluster interoperability.

Banyan's powerful attribute and role-based access control policies allow simple configuration at the application-level.

Real-time service-level observability

Real-time security events

Banyan captures and analyzes policy violations such as unauthorized accesses to critical applications in real-time.

Banyan also provides real-time and historical events data to better understand access patterns and detect anomolous behavior.

Banyan's data feeds can be easily integrated with Security Information and Event Management systems like Splunk and ArcSight.

Service dependency map distilled to processes and APIs

Look beyond just hosts and containers. Banyan employs sophisticated layer-7 protocol parsing and stream analytics to understand your applications, users, and their interactions.

Banyan's powerful Service Dependency Map understands flows between users and services down to application resources and processes/containers. Our intuitive Search and Filter capability allows you to visualize even the most complex communication patterns.

Use service flow analytics to create a security baseline and develop strong security policies.

Banyan empowers multiple teams

Security

Banyan secures access to critical internal applications from employees and other applications, leveraging its transparent Service Mesh fabric.

Security teams can easily enable identity, encryption, and access control to applications deployed across single, multi- or hybrid- cloud environments.

Operations

Banyan can be installed in minutes as part of machine images (e.g., AMIs), configuration managers (e.g., Chef, Puppet), or container orchestration platforms (e.g., Kubernetes, Mesos).

Ops teams can roll out comprehensive security without orchestrating disparate solutions, managing security appliances or mandating code changes.

Developers

Banyan makes security easy for developers - no SDKs to mange, no heavy security processes to conform, no unnecessary slow down.

Developers can also leverage the real-time service flow visibility graphs and application-level statistics to troubleshoot their distributed apps.

Works across a wide variety of environments ...