Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

RSAC – Access management to offer invisible infrastructure launched by Cryptzone

by The Gurus
April 23, 2015
in Editor's News
Share on FacebookShare on Twitter

Cryptzone has announced the launch of an access management solution designed to offer a solution for both cloud and hybrid environments.
According to the company, AppGate Secure Access enables organisations to adopt software defined perimeter approach for granular security control. AppGate Secure Access makes the application/server infrastructure effectively “invisible” and delivers access to authorised resources only, verifying a number of user variables each session before granting access to an application. Once the user logs out, the secure tunnel disappears.
Kurt Mueffelmann, president and CEO of Cryptzone, told IT Security Guru that the company is focused on access why it is difficult to defend. “The context is where and who you are and what device you are on,” he said. “We are specific on what you can see and making software invisible as once you are done in a session, you are terminated from a session. We take access from using a server and limit what you can see and the next phase is a set decision on access control on content and identify what is sensitive and confidential.”
He explained that it is taking a different approach to identity and access management, data loss prevention and network access control by rolling up the three systems into one solution.
“According to a recent survey we conducted, 90 per cent of companies are using aging VPN technology for network access control,” he said. “We must stop pretending that outdated notions of a defensible network perimeter still exist. Organisations have to flip the security paradigm on its head if they truly want to get in front of security threats.
Also, a majority (51 per cent) noted that their access control technology was greater than three years old, and 11 per cent said it was more than ten years old. Mueffelmann said: “The default position should be to make your infrastructure invisible, and then grant access on a case by case basis, only after user identity, posture and context have been validated. Organisations must stop giving out the keys to the kingdom when it comes to privileged user, third party and employee access.”
Jamie Bodley-Scott, global product manager of secure access at Cryptzone, told IT Security Guru that the new solution has a new topology to change the concept of a login process, as logging you in once and allowing you remain logged in is “a ridiculous concept and a bad security model, as in an hour an attacker can exfiltrate GBs of data”.

FacebookTweetLinkedIn
Tags: Access ManagementEncryptionIAM
ShareTweetShare
Previous Post

Tripwire Now Discovers More Than 100,000 Conditions and 15,000 Unique Applications

Next Post

RSAC – PhishMe expand services to categorise campaigns

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information