Subscribe
  • Home
  • /
  • Networking
  • /
  • Cryptzone transforms network security with new AppGate release

Cryptzone transforms network security with new AppGate release

Enables Easy Deployment of a Software-Defined Perimeter across Hybrid Environments.


Johannesburg, 11 Apr 2017

Cryptzone, the Software-Defined Perimeter company, announced the newest version of AppGate, which enables organisations to easily deploy a software-defined perimeter (SDP) for granular access control. The release of AppGate 3.0 furthers Cryptzone's vision for transformational network security - where all network services adopt an identity-centric security model.

We see almost daily that traditional approaches to network security - firewalls, DMZs, VPN, and NAC - are failing to protect enterprises. AppGate 3.0 instead employs an "authenticate first, connect second" approach for improved security. All users are validated with multi-factor, context-sensitive authentication, controlled by dynamic policies rather than static rules, before they're permitted to connect to network resources.

"It's clear that organisations need the security benefits provided by a Software-Defined Perimeter, and we are thrilled that vendors like Cryptzone have created Software-Defined Perimeter systems that are enterprise-ready," said Jim Reavis, Co-founder and CEO of the Cloud Security Alliance. "We anticipate continued growth in SDP adoption this year, as organisations recognise the value and necessity of taking a new approach to security."

AppGate 3.0 extends support for the software-defined perimeter architecture:

* All services are hidden behind Gateways, ensuring that only authorised users can access them.
* All AppGate components are protected by Single-Packet Authorisation (SPA), ensuring that even the AppGate entry point appears "dark" to unauthorized users.
* All users are authenticated prior to access, and access is controlled by dynamic policies that adjust to changes in server, user, and overall system and device attributes.
* Enhanced capabilities detect and respond to malicious or unauthorised attempts at network access.
* Enterprises can easily and securely deploy services across their hybrid infrastructure, including public cloud infrastructure - from a single, centralised console.

AppGate's transformational network security approach enables security teams to enthusiastically "say yes" to business requirements. For example, a large US-based transportation company decided to outsource management of key systems and applications to a remote third-party vendor. These users required access to on-premises applications, but the company's security team needed to limit their network privileges. With AppGate, they were able to precisely configure network access for these remote users with a simple set of policies, while maintaining the user experience and the network infrastructure. They were also able to easily meet compliance and audit reporting requirements associated with the outsourcing project.

For more information about Cryptzone's AppGate solution, visit: https://www.cryptzone.com/products/secure-access/appgate

Share

Cryptzone

Cryptzone reduces the enterprise attack surface by 99% with its secure network access solutions. Using a distributed, scalable and highly available Software-Defined Perimeter model, Cryptzone protects applications and content from internal and external threats while significantly lowering costs. In cloud environments including AWS and Azure, Cryptzone provides user access control, increases operational agility and improves the ability to meet regulatory and compliance standards. More than 450 companies rely on Cryptzone to secure their networks and data. For more information visit http://www.cryptzone.com.

Private Protocol

Private Protocol is a data security provider offering solutions and strategies that cover mobile device and information security, secure data collaboration, secure messaging, SharePoint/O365 security and compliance, data classification, file share security and compliance, web content compliance, data leakage prevention, endpoint security and cloud security. Private Protocol also offer data risk assessments so companies can understand where their data resides, where their data is going, who is using it and what devices are connecting to the network. Private Protocol covers Africa and Indian Ocean Islands and also has a distributed partner channel.

Contact:
Private Protocol
Web site - www.privateprotocol.com
E-mail - sales@privateprotocol.com
Contact - +27 11 801-9480

Editorial contacts

Sean Glansbeek
Private Protocol
(+27) 82 896 8637
seang@privateprotocol.com