Cryptzone Unveils ‘Invisible Infrastructure’ and Access Management Solution for Cloud and Hybrid Environments

Share Article

AppGate Secure Access Enables Organizations to Adopt Software Defined Perimeter Approach for Granular Security Control

Decorative Image of Secuirty in the Cloud

Cryptzone unveiled its next-generation access control solution, AppGate® Secure Access, at the RSA conference today enabling organizations to secure dynamic perimeters in cloud and hybrid environments

We must stop pretending that outdated notions of a defensible network perimeter still exist. Organizations have to flip the security paradigm on its head if they truly want to get in front of security threats.

Cryptzone, a provider of dynamic, context-aware network, application and content security solutions, today unveiled its next-generation access control solution, AppGate® Secure Access, enabling organizations to secure dynamic perimeters in cloud and hybrid environments.

“Organizations are faced with an increasingly porous perimeter, thanks to the cloud, BYOD, and the Internet of Things,” said Kurt Mueffelmann, president and CEO of Cryptzone. “According to a recent survey we conducted with TechValidate, 90 percent of companies are using aging VPN technology for network access control. We must stop pretending that outdated notions of a defensible network perimeter still exist. Organizations have to flip the security paradigm on its head if they truly want to get in front of security threats.”

Cryptzone’s next-generation access control product, AppGate Secure Access, is based on the Software Defined Perimeter (SDP) model, which evolved from work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative. AppGate Secure Access makes the application/server infrastructure effectively “invisible.” It then delivers access to authorized resources only, verifying a number of user variables each session—including device posture and identity—before granting access to an application. Once the user logs out, the secure tunnel disappears. Additionally, when a new device is on a public network, or a device that failed to log in tries to connect, additional security requirements (such as multi-factor authentication) can be enforced, or access can be denied.

Kurt Glazemakers, Senior Vice President of Product Strategy at Cryptzone, noted, “Starting with the premise of unlimited access, and then locking down an exploding number of applications on a case-by-case basis, no longer works. Sony, eBay and others have paid a heavy price when compromised credentials subsequently allowed access to valuable applications and data. AppGate Secure Access reverses the security model. By making the entire infrastructure invisible, and then delivering access when the user and device are authenticated—only for that specific session—Cryptzone is providing true agile security. We are delivering the next generation of security for today’s global and distributed business, without requiring a huge investment in order to achieve scalable, one-to-many security.”

With AppGate Secure Access, the full security posture—including device, location, time, group, configuration and more—are used by the policy engine to dynamically define access to applications. As AppGate Secure Access does not depend on a traditional network perimeter model or require specific hardware, it can be used across cloud and hybrid environments by leveraging software defined virtualization techniques.

To find out more, speak with the Cryptzone technology team at RSA (April 20-24, Moscone Center, San Francisco) in booth #S224 South Expo.

About Cryptzone
Cryptzone secures the enterprise with dynamic, context-aware security solutions that protect critical services, applications and content from internal and external threats. For over a decade, enterprises have turned to Cryptzone to galvanize their Cloud and network security with responsive protection and access intelligence. More than 750 public sector and enterprise customers, including some of the leading names in technology, manufacturing and consumer products trust Cryptzone to keep their data and applications secure. For more information, go to http://www.cryptzone.com or follow us @Cryptzone.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Jessica Morris

Irena Mroz
Visit website