Skip to content

The 12Port Platform

The 12Port platform includes modules that support privileged access management, credential vaulting, remote access sessions and microsegmentation to secure modern infrastructure environments. It is designed for organizations operating across hybrid infrastructure, cloud environments, and distributed systems, where traditional perimeter security is no longer sufficient.

The platform provides visibility, access control, and policy enforcement across all layers of the stack, supporting Zero Trust principles and compliance requirements at scale.

Privileged Access Management (PAM)

Privileged Access Management controls and audits access to critical systems. It secures North-South access paths and minimizes risk from compromised credentials or unauthorized user behavior.

Capabilities include:

  • Launching secure, recorded sessions via RDP, SSH, Telnet, VNC, IBM i, or browser-based protocols
  • Enforcing multi-factor authentication before session initiation
  • Recording session activity including keystrokes, file transfers, and clipboard use
  • Routing access through secure gateways
  • Automating approval workflows for elevated access

All privileged sessions are logged, recorded, and auditable.

Microsegmentation

Microsegmentation controls East-West movement within the network. It enforces communication policies between systems, workloads, and endpoints, limiting lateral movement during an incident.

Key features:

  • Visualization of internal traffic patterns
  • Tag-based policy creation and enforcement
  • Automated firewall rule generation on supported endpoints (Linux, Windows, AIX, Solaris, IBM i)
  • Policy violation detection and alerting
  • Traffic-based recommendations for segmentation

Microsegmentation reduces exposure and isolates potential threats.

Secrets and Credential Management

The platform includes a built-in credential vault to store and manage secrets such as passwords, SSH keys, and API tokens. It helps eliminate static secrets and reduces the risk of misuse or theft.

Functions include:

  • Secure storage of shared and privileged credentials
  • Automatic password and key rotation
  • Enforcement of complexity and format policies
  • Self-service password reset with auditing
  • Role-based access to secrets without direct exposure

Credential management ensures that sensitive access mechanisms are protected and governed.

Platform Integration and Deployment

The platform supports agentless deployment on Windows and Linux systems. It integrates with existing identity, asset, and infrastructure providers.

Integration options:

  • Import assets from Active Directory, AWS, VMware, or CSV
  • Connect to LDAP, Entra ID, Active Directory, or use the built-in user directory
  • Support for TOTP, YubiKey (HOTP), Duo, Email, and RADIUS-based MFA
  • Centralized policy and configuration management with multi-tenant support
  • High availability and distributed deployment via peer nodes

The platform adapts to cloud-native, legacy, and hybrid environments.

Unified Security Approach

This platform unifies access control, internal segmentation, and credential protection into a single system.

It provides:

  • PAM for controlling access to high-value systems
  • Microsegmentation for restricting internal communications
  • Secrets management for protecting credentials and keys
  • Centralized policy enforcement and automation across environments

This integrated approach supports Zero Trust architecture and real-world operational demands.


At 12Port, we provide a network security platform centered on microsegmentation. Our software visualizes internal east-west network traffic and segments workloads across physical, virtual, and cloud environments. The platform facilitates a division of a physical network on multiple virtual areas with limited requirements to communicate between each other in order to restrict the traffic between identified virtual segments. An essential part of Zero Trust architecture, the product builds micro-perimeters around small groups of assets behind the network firewall. The product empowers infrastructure owners to restrain malicious activity inside the network, to limit lateral movement across network devices, to contain breaches in the isolated areas, to reduce attack surface to a small number of exposed assets, and to minimize the potential impact of cyber attacks. At the same time, the product maps and preserves the functional traffic to the workloads served by the network assets. In addition to permanently enabled communication channels, configurable approval workflows allow managers to temporarily join IT administrators to the requested virtual segments, just in time, to perform necessary maintenance activities while keeping these same workloads closed, outside of these approved time windows. The platform features an agentless architecture to simplify deployment and maintenance. The separation of execution and control planes enables a single point of view to multiple isolated on-premises and cloud locations. Traffic control enforcement utilizes native operating system functions to avoid negative performance impact on the network traffic. Build-in integration with Entra ID, Microsoft Active Directory, SAML IdP, LDAP as well as numerous MFA providers such as TOTP, Radius enabled services, Yubikey, Duo Security, and e-mail based MFA allows for safe identification of users for configuration, change control, join request and approval purposes as well as for tagging network assets to trigger automatically applied micro-segmentation policies. The 12Port platform is the answer to secure and identifiable microsegmentation.