Each time a service attempts to access another resource, Aporeto creates a rich, multi-attribute application ID that travels with the I/0 request for authentication and policy authorization.
Aporeto automatically generates security policies for all resources based on their unique application identity and enforces them in distributed environments. Example: Transparent traffic encryption.
Aporeto orchestrates authentication, authorization, and encryption for all application resources. System-level run-time protection and visibility are achieved through inspection of all communication.