Scytale Enterprise

Enable zero trust by issuing and brokering continuously attested service identity across any platform

Industry-first Service Identity Platform

Scytale Enterprise provides security and infrastructure engineering teams a web-scale, unified platform to broker and issue service identities. Unlike other approaches, Scytale Enterprise provides scalable, cryptographic, platform agnostic identities based on open standards. As a result, it enables you to boost security operations and developer productivity, reduce application on-boarding, accelerate cloud or container adoption while strengthening your overall security posture.
Cc28ff101a3bef5cedb249c17c352a66e73267d9 prod

Key Features

  • Scytale%2f5d7f335f 9374 4260 aa7c 996d12f12f44 platform
    Scalable, cryptographic, platform agnostic service identity based upon an open standard (SPIFFE)

    Deploy standard, cryptographic service identities across heterogeneous platforms including cloud, containers, and on-premise infrastructure. These identities are based an open-standard, SPIFFE, backed by the Cloud Native Computing Foundation (CNCF).

  • Scytale%2f98f5cb39 bde0 499c acb5 2420138e71b0 lock network
    Multi-factor service authentication

    Instead of authenticating service-to-service communication with long-lived credentials that must be provisioned and rotated with the service, Scytale Enterprise identifies services through real-time multi-factor authentication policies.

  • Scytale%2f7cb16a25 45f5 47fc 9819 4af5daa8ea44 opensource
    Dial tone authentication

    Authentication can be deployed and governed by infrastructure and operations teams, and made available as consistent a “dial-tone” API to any engineering team.

  • Scytale%2fb96e8d34 aa4c 44c4 b5cb c983ad524c10 office folder
    Unified service directory and credential delivery

    Encapsulates complexity by unifying service identities across IdPs spanning cloud, container, and on-premise identity providers through a single service-facing API.

  • Scytale%2f6877d8bb 7f14 487b 9753 fe8bb1907a49 cloud
    Identity brokering

    Enables you to extend your existing identity providers and authentication infrastructure (such as Active Directory) to the cloud and containers, and allows services running in one cloud to assume identities in others.

  • Scytale%2f4a7785fc 6366 4cbd 98a4 99231acd4008 shield search
    Comprehensive auditability

    Ensure compliance and precisely identify where and when service credentials are generated and delivered with granular tracing even in highly elastic and dynamic environments.

Benefits

  • Scytale%2ffa7fc66b 8ad2 4aa5 b467 74e1092f1efd time

    “Scytale can enable us to reduce application on-boarding cycles from weeks to minutes.”

    Head of Cyber Security Technology

  • Scytale%2f3b893a4d 932f 4770 8235 588fbc7d908e cloud ok

    “Scytale can provide us with a common identity model that adapts to various platforms, and speed adoption of new, dynamic infrastructure without loss of security.”

    Director Security Architecture

  • Scytale%2f748105e5 8ccd 4a7f a0fe d452959ce901 performance

    “Less code for developers, fewer manual requests for us. We just manage policies, the rest is automated.”

    VP Security Engineering

“Scytale’s approach is particularly exciting for its focus on unifying access controls to services across complex, hybrid IT ecosystems. By consolidating authentication practices for all services, organizations will greatly simplify IT service orchestration as they transition to cloud environments, while achieving security assurance.”

Steve Brasen, 
Research Director with Enterprise Management Associates (EMA)

EMA logo

2019 Copyright Scytale Inc