John Kindervag

Creator of Zero Trust

John Kindervag

Embrace Zero Trust with Ease

DOwnload the Zero Trust Dictionary

redefine what it means to have your services managed

Quickly gain the protective power of Zero Trust with ON2IT’s Zero Trust as a Service

ON2IT’s Zero Trust as a Service delivers a new approach to managed cybersecurity services, designed for prevention, enabling you to embrace Zero Trust with ease and 24/7 support from our comprehensive SOC team. We are Zero Trust.

Built on the Zero Trust strategy, created by ON2IT’s John Kindervag, Zero Trust as a Service delivers the industry’s strongest protection against cyber threats as a managed service.

the only mssp with zero trust as a service

The pillars of your cyberdefense

Zero Trust

INNOVATORS SINCE 2005

ON2IT provides every client with experienced and innovative cybersecurity experts, including the creator and Father of Zero Trust, John Kindervag, as SVP of Cybersecurity Strategy.

read more ›

AUXO™

PROPRIETARY ZERO TRUST platform

The first to offer the best of SIEM, SOAR, and MDR: the all-in-one automated managed service platform integrating our cutting-edge Eventflow™ technology for superior breach protection.

read more ›

mSOC™

CERTIFIED 24/7 managed SOC

Focus on your core business while the mSOC™ functions as your fully operational security conscience. Leverage the experience, skills, and latest tooling ON2IT’s Zero Trust experts offer.

read more ›

zero trust Prevents
Data Breaches

Secure your critical assets with unsurpassed protect surface management

Using a Zero Trust strategy reduces your overall attack surface by segmenting your infrastructure in much smaller protect surfaces, optimized to safeguard your valuable resources against known and unknown threats.

Zero Trust as a Service includes:

A transparent view of all protect surfaces and their DAAS elements, traffic patterns, preventive measures and threats per protect surface
Active management of all controls per protect surface
Zero Trust Fitness: a real-time view of the state of your cybersecurity
Request a demo
AUXO - Zero Trust Platform

fast track your zero trust journey

Utilizing the NSTAC recommended Five-Step Methodology

Define the protect surface

Map the transaction flows

Build a Zero Trust architecture

Zero Trust Policy

Create a Zero Trust policy

Monitor Maintain Network

Monitor and maintain the network

The Five-Step Methodology is recommended by the NSTAC (The President’s National Security Telecommunications Advisory Committee) in the Zero Trust and Trusted Identity Management draft report of March 2022.

BETTER PREVENTION,
Less staff

Our integrated AUXO™ solution to dramatically decrease your workload and free up valuable resources: Eventflow™

With our AI-based Eventflow™ automation, only one in every 100,000 events need manual inspection, so you get fewer alerts instead of more.

Eventflow™

Ingests logs and events from a variety of security controls and cloud environments
Enriches and weighs each and every security event using the Zero Trust Contextualization Engine
Automates responses using our Rules of Engagement
Request a demo

GET Unparalleled insight and actionable advice

Problem identification and recommended solutions after every critical event

24/7 visualization of your Zero Trust Fitness and policy validations in real-time

24/7 visualization of your Zero Trust Fitness and policy validations in real-time

Personalized Security Improvement Advisories to strengthen your security even further

Personalized Security Improvement Advisories to strengthen your security even further

Dashboards and reports on our SOC performance and all SOC analyst remediations

Dashboards and reports on our SOC performance and all SOC analyst remediations

Cybersecurity blog

News, articles and opinions on cybersecurity

John Kindervag

No More Sucking Chest Wounds

The world of cybersecurity continues to have a battlefield littered with sucking chest wounds that go untreated. We are too passive. Too afraid of action. Too intimidated to do the right thing for our organization. There are a ton of excuses for this…

Read more ›

The Log4j lessons: so what IS vulnerability management anyway?

What does vulnerability management involve? What tools to use? And how to operationalize it into a long-term strategic cybersecurity approach.

Read more ›

The war situation in Ukraine and cyber threats

On February 24, we sent out a security update on the cybersecurity implications of Russia’s invasion of Ukraine. In this new bulletin, we give you a status update on the most recent developments.

Read more ›