A simple, three-click enrollment process now enables this “round-trip” security:
1. Secures network communications with advanced device traffic encryption and authentication.
2. Detects malware and anomalous network traffic in real-time.
3. Pin-points precise users and devices that activate each attack alarm.
4. Triggers immediate action to ensure compromised devices are isolated by automatic quarantine or wipe.
5. Provides detailed forensic clarity to security analysts, allowing the fastest possible manual response.
With this new release, more devices and more operating systems can be protected and enabled within seconds, without hardware being shipped or software installed. Cyber adAPT is now available in a 100% virtualized environment – meaning all deployment options are now open to the security architects: multi-tenant cloud service, private cloud and hybrid solutions, a virtual machine delivered onto the client’s infrastructure, and the dedicated Cyber adAPT appliance.
“Cyber adAPT brings customers visibility and control, something they have yet to experience from a security platform that focuses on behavior outside of the traditional ‘core network’,” says Michael Weinberger, senior vice president of product development at Cyber adAPT.
“Imagine having a brand new Ferrari in the driveway that you are scared to drive at any speed because you can’t see through the warped windshield. That’s what it’s like for many chief information security officers (CISOs) who feel they have to hold back on the mobile-throttle because they have no way of detecting and isolating dangerous traffic that flies past.”
Many companies have made initial progress enabling users and devices in the field, outside of the core network. Tools such as mobile device management (MDM) and the wider enterprise mobility management (EMM) provide a degree of control and data access, but are woefully short of being a secure solution.
Reluctance to deploy genuine security can be down to an underestimation of the ease and impact of an attack. Adversaries that target entry through an unsecured device like a smart phone can cause more damage, more quickly than through attack surfaces behind the protection of the traditional perimeter.
Even when this threat is understood, the perceived mitigation requirements of cost, infrastructure, management overhead and user experience can be overwhelming. Cyber adAPT’s new cloud service has been released to combat this issue directly.