Cloudbrink Presents Firewall-As-Service for the Hybrid Workplace

PRESS RELEASE. SUNNYVALE, CA - DECEMBER 5, 2023 - Cloudbrink has added firewall-as-a-service to its zero-trust access solution, the first vendor to provide granular security controls all the way to the user edge for the comprehensive protection of endpoint devices.
The company, which delivers high-performance zero-trust application connectivity to the hybrid workforce, says traditional and next generation firewalls fail to protect end users and their devices.
Offloading remote-user security functions improves the stability of existing firewalls and the network performance experienced by remote users, Cloudbrink claims.
Cloudbrink's FWaaS enables admins to set granular controls according to static and dynamic properties of the end-users and their devices.
Static properties include rules about what resources or applications can be accessed by individuals.
Soon to be released dynamic properties cover the compliance of the device - when a virus scan ran last, for example.
Also scheduled for a future release are reporting capabilities enabling security and networking teams to spot anomalies based on user behaviour and opportunities to tune application performance.
Cloudbrink's service already implements zero-trust access and moving target defense principles.
It uses rotational mTLS 1.3 to refresh user certificates automatically at short intervals.
We already deploy best-in-class zero-trust security to control access at the user level.
The FWaaS enables the service to be tailored more closely to the security needs of the enterprise.
Separately, Cloudbrink announced that customers will be able to use the service to access data center applications using IPSec as an alternative to the Cloudbrink Connector.
The IPsec capability will support connections through existing network firewalls, SD-WAN gateways, routers and other IPSec devices.
FWaaS functionality and IPsec connectivity are bundled with the Cloudbrink service starting December 2023.
Cloudbrink brings high-performance connectivity to the modern hybrid workforce anywhere in the world.
The company uses AI and ML to provide edge-native hybrid access as a service.
HAaaS delivers accelerated performance for cloud, SaaS, and data center applications.
Cloudbrink's software-only solution includes the world's first personal SD-WAN with high-performance zero-trust access and Automated Moving Target Defense security.
With the ability to use thousands of dynamic PoPs called FAST edges, Cloudbrink provides an in-office experience with a 30x increase in application performance and reduced operational complexity for network, security, and IT administrators.
Based in Sunnyvale, California, the Cloudbrink team has decades of combined expertise in last-mile network connectivity, security, and distributed systems.


This Cyber News was published on www.darkreading.com. Publication date: Wed, 06 Dec 2023 23:25:07 +0000


Cyber News related to Cloudbrink Presents Firewall-As-Service for the Hybrid Workplace

Cloudbrink Presents Firewall-As-Service for the Hybrid Workplace - PRESS RELEASE. SUNNYVALE, CA - DECEMBER 5, 2023 - Cloudbrink has added firewall-as-a-service to its zero-trust access solution, the first vendor to provide granular security controls all the way to the user edge for the comprehensive protection of ...
10 months ago Darkreading.com
Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
9 months ago Techtarget.com
What Is a Host-Based Firewall? Definition & When to Use - Organizations often use host-based firewalls when specific network applications or services require open communication channels that aren't allowed under default firewall settings. To install a host-based firewall across all endpoints, choose your ...
8 months ago Esecurityplanet.com
7 Keys to an Effective Hybrid Cloud Migration Strategy - Not very long ago, a hybrid cloud migration strategy amounted to a business extending its internal workloads into an environment it doesn't own. A hybrid cloud strategy was relatively simple - a combination of on-site resources and some type of cloud ...
9 months ago Techtarget.com
Vectra AI Launches Global, 24x7 Open MXDR Service Built to Defend Against Hybrid Attacks - PRESS RELEASE. San Jose, Calif. - February 15, 2024 - Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, today announced the launch of Vectra MXDR services, the industry's first global, 24x7 open MXDR service built to ...
7 months ago Darkreading.com
9 Best Next-Generation Firewall Solutions for 2023 - Next-generation firewalls are network security solutions that go beyond the traditional port/protocol inspection by incorporating application-level inspection, intrusion prevention, and external threat intelligence. As the third generation in ...
9 months ago Esecurityplanet.com
What Is a Firewall Policy? Ultimate Guide - A firewall policy is a set of rules and standards designed to control network traffic between an organization's internal network and the internet. There are key components to consider, main types of firewall policies and firewall configurations to be ...
9 months ago Esecurityplanet.com
Top 12 Firewall Best Practices to Optimize Network Security - The consistent implementation of firewall best practices establish a strong defense against cyber attacks to secure sensitive data, protect the integrity and continuity of business activities, and ensure network security measures function optimally. ...
10 months ago Esecurityplanet.com
Easy Firewall Implementation & Configuration for Small and Medium Businesses - Here at Cisco, we've developed industry-leading firewalls designed specifically for the needs of SMBs. Our Secure Firewalls for small businesses help simplify security, with streamlined implementation at a price point that is affordable. Once you ...
9 months ago Feedpress.me
What Are Firewall Rules? Ultimate Guide - Firewall rules are preconfigured, logical computing controls that give a firewall instructions for permitting and blocking network traffic. Network admins must configure firewall rules that protect their data and applications from threat actors. ...
8 months ago Esecurityplanet.com
Top Ten FirewallasaService Companies - Firewall as a Service (FWaaS) is a way of providing firewall functionality in the cloud, rather than on the traditional network perimeter. This is beneficial for businesses that have migrated their data and applications to the cloud, as it allows ...
1 year ago Cybersecuritynews.com
3 Essential Firewall Attributes to Secure Today's Network - Every modern network needs to be kept secure, and an equally secure firewall is the foundation of achieving this security. Firewalls are the first line of defense against threats from outside and from within a network. A firewall can be an appliance, ...
1 year ago Csoonline.com
What is Security Service Edge? - The contemporary work landscape is swiftly transitioning into a hybrid model, encompassing remote and office-based work for employees. This transformation introduces novel challenges in ensuring security across many work locations with diverse ...
9 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
10 months ago Esecurityplanet.com
8 Hybrid Cloud Security Challenges and How to Manage Them - Business transitions, incompatible technology environments and rapid changes in dynamic public cloud services can cause hybrid cloud security challenges. Single hybrid cloud is now multiple clouds, said Mark Buckwell, executive cloud security ...
9 months ago Techtarget.com
What is Firewall as a Service? - A firewall serves as a barrier to unapproved network traffic. A firewall creates a remotely delivered cybersecurity solution licensed on a subscription basis as a Service or FWaaS. Companies can streamline their IT infrastructure using Perimeter81 ...
8 months ago Cybersecuritynews.com
2024 Tech Predictions: Hybrid Collaboration is Here to Stay - Reflections from the Consumer Electronics Show and predictions for the year in tech. From home, the office and everywhere in between, we use Cisco collaboration solutions to solve hybrid work's greatest challenges, while inspiring innovation, ...
8 months ago Feedpress.me
Enhancing firewall management with automation tools - Help Net Security - In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. Firewall rule ...
1 week ago Helpnetsecurity.com
Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy - You hear a lot about zero trust microsegmentation these days and rightly so. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the ...
9 months ago Feedpress.me
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
8 months ago Feeds.dzone.com
Help Firewall Admins With Cisco AI Assistant for Security - At its core, a firewall is a shield that protects your network from malicious traffic. But those who work with firewalls every day know the reality: An average firewall has thousands of rules governing how traffic should be handled, many of which may ...
10 months ago Feedpress.me
What Is a Next-Generation Firewall? - A next generation firewall performs deep packet inspection to check the contents of the data flowing through the firewall. Unlike more basic firewalls that only check the header of data packets, NGFWs examine and evaluate the payload data within the ...
8 months ago Esecurityplanet.com
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
6 days ago Aws.amazon.com
Is Hybrid Play Leveling the Playing Field for Online Video Gaming? - As technology continues to evolve, the market for online video gaming has grown exponentially. With the advent of hybrid play, we have seen the emergence of digital console gaming and increasing proficiency in a variety of gaming platforms. This ...
1 year ago Welivesecurity.com
CVE-2015-2351 - Multiple cross-site scripting (XSS) vulnerabilities in Alkacon OpenCms 9.5.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) homelink parameter to ...
6 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)