Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

How Threat Defense Works with Zero Trust Access

Figure 1: Threat Defense Deployment
  1. Using a browser, a remote or on-prem user sends a HTTPS request to connect to an application from an endpoint.

  2. The HTTPS request is intercepted by the firewall that protects the application.

  3. The firewall redirects the user to application’s configured IdP for authentication.


     

    In the figure, each firewall protects a set of web applications. The user can directly access the applications behind the firewall after authentication and authorization.

  4. After the authentication and authorization process is complete, the firewall allows the user to access the application.