From Vulnerable to Vigilant:
Transforming Cybersecurity
in Health Technology with Invisily


Web App
Health Technology
Enhanced user experience
Improved data protection
Expanded access control
Simplified compliance adherence
React Native

Executive Summary

A North American health tech company faced challenges with remote workforce security, VPN limitations, and adhering to HIPAA and GDPR data protection regulations. They adopted Invisily's Universal Zero Trust Network Access (ZTNA) solution, transitioning from vulnerable VPNs to a more robust and flexible security approach. This case study highlights how Invisily enhanced the company's security posture, ensuring compliance and protecting sensitive health data, while offering a broad range of capabilities from dynamic policy management to advanced threat protection.

About The Company

A North American health tech firm with a global reach, specializing in medical device and pharmaceutical manufacturing. The company provides engineering and recruitment consultations, auditing, training, and quality system certification, mainly serving the life sciences sector. The organization focuses on specialized staffing and consulting for technically complex projects across various international regions, adhering to high industry standards and regulations.

Challenges Faced by the Company

Remote Workforce Security:  A shift to remote work, post covid, necessitated a reevaluation of network security measures, as employees accessing company resources from diverse, potentially unsecured locations extended the network's traditional boundaries, intensifying the need for robust and secure remote access systems.

Third-Party Collaboration Risks:  Engaging with multiple third-party collaborators heightened the risk of data breaches. This was worsened by traditional VPNs providing broad network access, potentially compromising data security and integrity.

Insider Threats:  The company needed to formulate strategies to mitigate risks from insider threats, which include both deliberate and inadvertent data leaks, posing a significant challenge in maintaining data confidentiality and integrity.

Compliance Requirements:  Operating in a highly regulated environment meant stringent adherence to data protection regulations like HIPAA and GDPR was critical; this was especially challenging due to the involvement of third-party data processors.

Limitations of Other Approaches

VPN Weaknesses:  The company acknowledged the inherent vulnerabilities of VPNs in a landscape of evolving cyber threats, particularly noting their inability to adequately restrict access and prevent lateral movement within the network.

Rigid 'Rip and Replace' Models:  In exploring solutions to emerging security issues the company was exposed to vendors who demanded extensive and disruptive changes to the existing network infrastructure, an approach that was incompatible with the company's preference for more adaptable solutions.

Narrow Solution Focus: A significant challenge was encountering vendors whose ZTNA solutions had a limited scope, primarily focusing on replacing VPNs without offering comprehensive features like dynamic policy management or micro segmentation.

Need for a Holistic ZTNA Solution: The realization dawned that a more encompassing ZTNA solution was necessary, one that would address not just the weaknesses of VPNs but also provide a broader range of security functionalities to meet the company's complex needs.

Solution - Invisily Universal ZTNA Implementation

Invisily Universal ZTNA was implemented to address the company's cybersecurity needs. This solution offered a broad spectrum of functionalities, adapting seamlessly to both cloud and on-premises environments. Its flexible deployment models and inclusive approach to remote and on-premises access control marked a significant upgrade from traditional VPNs.


Improved User Experience:  Post-Invisily deployment, employees enjoyed a more seamless and non-intrusive experience while accessing services, enhancing productivity compared to the previous VPN system.

Data Protection Enhancement:  The company effectively implemented micro segmentation to safeguard personal data, preventing lateral movements in case of network breaches and ensuring data access only to authorized personnel.

Expanded Access Management: Invisily facilitated comprehensive access control, not just for remote workers but also for on-premises employees and third-party collaborators, ensuring secure data access across various user groups.

Simplified Compliance with Regulations: The adoption of Invisily streamlined compliance with regulations like HIPAA and GDPR, by enforcing strict access controls and least privilege principles, ensuring encrypted data protection, and providing robust monitoring and audit trails.

Utilization of Broad Security Features:

  • Hardware and Software Asset Management: Ensuring secure access through an approved device and software registry.
  • Secure Web, Cloud, and SaaS Access: Safeguarding interactions with cloud-based systems.
  • Scheduled Access Controls: Implementing time-based access policies for sensitive data.
  • Next-Generation Network Access Control (NAC): Filling gaps in network access control without needing a separate NAC.
  • Dynamic Policy Management: Tailoring access based on context and behavior.
  • Network Micro-segmentation: Isolating critical network segments for enhanced security.

About Invisily

Invisily, a Universal ZTNA, is crafted by cybersecurity experts with over 15 years of experience. It offers a comprehensive solution for organizations to enhance their cyber hygiene in line with the Center of Internet Security IG1 guidelines. Distinguished from traditional ZTNA solutions, Invisily provides a wide array of use cases.

Here’s what Industry Analyst Kuppinger Cole is saying about Invisily:

“Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique capabilities such as sophisticated device inventory and posture checks, agentless and embeddable connectivity, and built-in DLP controls. Its flexible architecture backed by the vendor’s expertise in managed services helps customers adopt Zero Trust in a simple, unobtrusive, and painless fashion.”

“Invisily literally ticks all the boxes in almost every imaginable list of requirements for a sophisticated ZTNA platform"

“Invisily is a comprehensive ZTNA solution with a modern architecture without the technical debt of many competing products. Its “killer feature” is undoubtedly the comprehensive support for hardware and software posture management for endpoint devices baked directly into the platform. This enables customers to create sophisticated policies that not only enforce the tenets of Zero Trust but provide additional security capabilities like NAC or DLP”

To experience the Invisily difference and adopt a universal ZTNA at your organization you can get in touch with us for a personalized demo.

Book A Call >

Customer Case Studies

Zero Trust in Action: Reinventing Access for the Remote Workforce

This case study explores the journey of a prominent tech firm from the vulnerabilities of traditional VPNs to the robust, flexible security of Invisily's ZTNA, highlighting the strategic improvements in user experience and access management.
Read more >Download PDF >

Contact Us

Invisily is built by a seasoned team of cybersecurity technologists and researchers at Ebryx whose R&D powers some of the world's leading cybersecurity products.

For more information about Invisily ZTNA please send us a meeting request at
Contact Info