BYOD Passwords Hacking Cloud Compliance Reviews Privacy

Current Filter: Security>>>>>News>

PREVIOUS

Filtered Articles:12 of 268   Current Article ID:5405

NEXT



Invisible infrastructure and access management from Cryptzone

Editorial Type: News     Date: 04-2015    Views: 1918   








AppGate Secure Access Enables Organizations to Adopt Software Defined Perimeter Approach for Granular Security Control

Cryptzone has unveiled its next-generation access control solution, AppGate Secure Access, enabling organisations to secure dynamic perimeters in cloud and hybrid environments.

Organisations are faced with an increasingly porous perimeter, thanks to the cloud, BYOD, and the Internet of Things, said Kurt Mueffelmann, president and CEO of Cryptzone. According to a recent survey we conducted with TechValidate, 90 percent of companies are using aging VPN technology for network access control. We must stop pretending that outdated notions of a defensible network perimeter still exist. Organisations have to flip the security paradigm on its head if they truly want to get in front of security threats.

Cryptzone’s next-generation access control product, AppGate Secure Access, is based on the Software Defined Perimeter (SDP) model, which evolved from work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative. AppGate Secure Access makes the application/server infrastructure effectively invisible. It then delivers access to authorised resources only, verifying a number of user variables each session—including device posture and identity—before ge granting access to an application. Once the user logs out, the secure tunnel disappears. Additionally, when a new device is on a public network, or a device that failed to log in tries to connect, additional security requirements (such as multi-factor authentication) can be enforced, or access can be denied.

Kurt Glazemakers, Senior Vice President of Product Strategy at Cryptzone, noted, Starting with the premise of unlimited access, and then locking down an exploding number of applications on a case-by-case basis, no longer works. Sony, eBay and others have paid a heavy price when compromised credentials subsequently allowed access to valuable applications and data. AppGate Secure Access reverses the security model. By making the entire infrastructure invisible, and then delivering access when the user and device are authenticated—only for that specific session — Cryptzone is providing true agile security. We are delivering the next generation of security for today’s global and distributed business, without requiring a huge investment in order to achieve scalable, one-to-many security.

With AppGate Secure Access, the full security posture—including device, location, time, group, configuration and more—are used by the policy engine to dynamically define access to applications. As AppGate Secure Access does not depend on a traditional network perimeter model or require specific hardware, it can be used across cloud and hybrid environments by leveraging software defined virtualisation techniques.

Like this article? Click here to get the Newsletter and Magazine Free!

Email The Editor!         OR         Forward ArticleGo Top


PREVIOUS

                    


NEXT