BYOD Passwords Hacking Cloud Compliance Reviews Privacy

Current Filter: Security>>>>>>

Key Word Search Filter within Articles: Advanced integration with cloud storage apps

PREVIOUS

Filtered Articles:1 of 1   Current Article ID:6338

NEXT



Free-flowing access control

Editorial Type: News     Date: 01-2016    Views: 1433      






Certes Networks' award-winning CryptoFlow product suite offers automatically enforced role-based access control for users on any Apple, Windows or Android device

Certes' CryptoFlows enable 'frictionless enterprise' deployments of networked applications to be rolled out, without increasing risk, says the company.

The product suite creates secure virtual overlays called CryptoFlows that protect enterprise applications end to end. CryptoFlow secure overlay can connect authorised users on any device to applications in a data centre, cloud, virtualised environment or distributed and hybrid deployment.

The solution blocks the top attack vector used in hacking attacks worldwide: the compromise of low-privilege users that gives hackers unfettered access to move laterally through enterprise IT resources to reach the most sensitive applications.

Like this article? Click here to get the Newsletter and Magazine Free!

Email The Editor!         OR         Forward ArticleGo Top


PREVIOUS

                    


NEXT