Leagsoft UniSDP Zero Trust Network Access System offers separation of control plane and data plane based on zero trust architecture (ZTA) and software-defined perimeter (SDP) security framework. Built on zero trust principle and authentication & authorization processes while focused on business security, UniSDP is an industry-leading solution that implements integration of business and security. UniSDP leverages granular access controls, complete and actionable insight and lightweight sandbox with simple configuration to provide user-centric and dynamic trusted access. UniSDP emerges as a powerful solution to enhance the security of enterprise application systems based on single packet authorization (SPA) and least privilege access.

Trusted Identity

Trusted Access

Trusted Device

Trusted Application

Trusted Data


Continuously verify and authenticate connections between users, applications, devices and data based on granular access control policies; Supports Multi-factor authentication (MFA), SSO working in conjunction with MFA such as QR code authentication to balance security and efficiency.


Based on SPA, a sophisticated form of port knocking that helps cloak internet ports from threat actors, UniSDP helps your team defend against a targeted attack and reduces the risk of being attacked; Application-level security encrypted transmission channel, two-way certificate verification, ensures the security of the data transmission process; Intelligently identifies the access scenarios and automatically switches the access mode with one agent, and intelligently correlates the network access authentication and the zero trust authentication through dynamic situational awareness.


Protect data using granular context-based policies based on ABAC model, implementing zero trust policies to verify access requests and rights based on context, including user identity, device, location, type of content, and the application being requested. Policies are adaptive, so user access privileges are continually reassessed as context changes. Every device that connects to a network resource should be fully compliant with the zero trust and security policies of the organization. This includes security baseline, security configuration, patch management and peripheral management.


Streamline access process by establishing an enterprise portal to implement unified management of enterprise applications;
Leverage enterprise-level software store to publish and download applications safely and easily, and manage applications in application enrollment, publishing, access privilege and secure transmission, etc;
Continuous Monitoring and Validation;
Dynamic access control policies determine whether to approve requests based on factors such as a user’s privileges, physical location, device health status, threat intelligence and unusual behavior. Connections are continuously monitored and must be periodically reauthenticated to continue the session.
Leverage enterprise-level software store to publish and download applications safely and easily, and manage applications in application enrollment, publishing, access privilege and secure transmission, etc;
Continuous Monitoring and Validation;
Dynamic access control policies determine whether to approve requests based on factors such as a user’s privileges, physical location, device health status, threat intelligence and unusual behavior. Connections are continuously monitored and must be periodically reauthenticated to continue the session.


Apply data security policies such as sensitive file inspection, outgoing channel audit, digital watermarking techniques, data encryption to safeguard information on terminals and manage data along entire lifecycle.