Software Defined Perimeter (SDP) Implementation

Stop attacks on your critical applications

Hide them from hackers in an invisible Black Cloud

In one solution, you can solve the biggest threats to your business – credential theft, vulnerable code exploitation, and brute force large scale DDoS attacks. Make your critical applications completely invisible by moving or wrapping them within your very own Black Cloud – on premise or in a public or private cloud, a DMZ, a server in a data center, or even inside an application server.

The Software Defined Perimeter (SDP) has been tested repeatedly and proven to stop all forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10), as well as Advanced Persistent Threats (APT). As co-authors of Cloud Security Alliance’s Software Defined Perimeter, we are uniquely qualified to protect your most vital assets with the industry’s first open-source software defined perimeter.

The Changing Perimeter

Historically, enterprises deployed a perimeter security solution in their data center to protect against external threats to their application infrastructure. However, the traditional perimeter model is rapidly becoming obsolete for two reasons:

1.) Hackers can easily gain access to devices inside the perimeter (for example via phishing attacks) and attack application infrastructure from within. Moreover, this vulnerability continues to increase as the number of devices inside the perimeter grows due to Bring Your Own Device (BYOD), on-site contractors, and partners.

2.) Traditional data center infrastructure is being supplemented with external resources such as PaaS, IaaS, and SaaS. Subsequently, networking equipment used for perimeter security is topologically ill-located to protect application infrastructure.

The growth of devices moving inside the perimeter and the migration of application resources to outside the perimeter has stretched the traditional security model used by enterprises. Existing workaround solutions that involve backhauling users to a data center for identity verification and packet inspection do not scale well.

The software defined perimeter or Black Cloud is a new approach that enables application owners to protect infrastructure on premise or in a public or private cloud, a DMZ, a server in a data center, or even inside an application server.

For the first time ever, SDPs combine and integrate 1) device authentication, 2) identity-based access, and 3) dynamically provisioned connectivity to hide your critical applications from hackers.

Contact us today to assess how your applications can be hidden in a Black Cloud.


IW-DarkReading-fb-button  GCN_logo-square  Federal News Radio interviews Waverley Labs on software defined perimeters or black clouds

Waverley Labs' Software Defined Perimeter as seen in DarkReading (logo)  CSA-Logo-350


Open-Sourced Software Defined Perimeter

  • Hide your applications from hackers
  • Move your apps or wrap them within an invisible cloud
  • Works for any authorized desktop or mobile device
  • Engineered for a mobile workforce and cloud-dependent architectures
  • More affordable to create than a proprietary SDP
  • Vetted, more reliable code base than a proprietary SDP
  • Standardized implementation is more manageable than a proprietary SDP

Prevent Network-Based Attacks

  • Revolutionary approach to cyber security
  • Leverages cloud technologies to scale
  • Creates dynamically provisioned perimeters
  • Provides zero visibility and zero connectivity
  • Connects once endpoints prove trustworthy
  • Works with mobile devices and clouds


Stop The Attacks

See a diagram of a Black Cloud and discover all the attacks it will prevent.