Traditional OSI Model vs. Droplet NeverTrust™ Containers

Go beyond Zero Trust with NeverTrust™

Layers - Droplet NeverTrust™

Droplet NeverTrust™ (7) Layers Explained

Our (7) layered approach to secure application delivery meets the latest cyber accreditation standards for how applications are delivered to end users, including the latest cyber essentials (v3.1) cyber essentials plus, NIS2 and DORA, whilst substantially improving the security posture of your infrastructure and helps futureproof and extending the lifespan of your mission critical, vulnerable x86 applications (Client or Server).

Icon Background

Applications Delivered ~ Secure By Design

Layer (1)  – Mission Critical

Droplet NeverTrust™ containers have been adopted across healthcare, military, nuclear, retail and manufacturing organisations, to help migrate and deliver their mission critical applications.

Layer 1 - Droplet NeverTrust™

Layer (2) – Data Layer

By default, Droplet removes all admin rights from every user and controls the data paths of your applications, restricting where users and applications can communicate across other areas of your network.

Layer 2 - Droplet NeverTrust™

Layer (3) – Endpoint

Droplet containers can be deployed on any endpoint and supports many operating systems including: Windows, macOS chromeOS and Linux or it can be delivered on premise or via any cloud platform or hypervisor.

Layer 3 - Droplet NeverTrust™

Layer (4) – Application

To meet the latest cyber standards, every application delivered via a Droplet NeverTrust™ container is totally isolated away from the underlying operating system or hypervisor of the device we’re installed on.

Layer 4 - Droplet NeverTrust™

Layer (5) – Network

To prevent man in the middle, ransomware or zero-day attacks, by default, all network traffic between a Droplet NeverTrustTM (beyond Zero Trust) container and a Droplet server appliance is encrypted to military standards.

Layer 5 - Droplet NeverTrust™

Layer (6) – Perimeter

By default, Droplet NeverTrust™ containers block all inbound traffic, unless you’re accessing us via a Droplet container, any unauthorised attempt is seen as external traffic and dropped automatically..

Layer 6 - Droplet NeverTrust™

Layer (7) – Human

To prevent privileges being elevated, Droplet users have no admin rights, their only functionality is to launch applications, they can’t add, modify or delete an app, and have no access to a desktop or settings.

layer 7 - Droplet NeverTrust™

Layer (8) – Droplet NeverTrust™

By default Droplet’s NeverTrust™ approach to secure application delivery meets the latest cyber accreditation standards for application delivery, including CE, CE+, NIS2 and DORA.

layer 8 - Droplet NeverTrust™

Use Case Resources

Keep up to date

Sign up for Droplet NeverTrust email alerts and news!

    Droplet NeverTrustTM Summary

    They sit across the whole 7 point OSI model of security, which is very unique. I know of no other single product that does all of the complexities as well that are that you have to, you know, does this one cause a conflict with the identity access manager or is it is that causing a problem within your security somewhere else, and all of those integration points cause complexity.
    We take away that complexity delivering, we’ve embraced the complexity internally, in the product, to deliver simplicity.

    So, if you have customers with struggling budgets or something, you start get tactical about right. We might not need some of these vendors in these spaces and this cost because we’re dropper.

    layer 8 - Droplet NeverTrust™
    keyboard_arrow_up