When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Teleport (software) - Wikipedia

    en.wikipedia.org/wiki/Teleport_(software)

    Teleport is an open-source tool for providing zero trust access to servers and cloud applications using SSH, Kubernetes and HTTPS. [2] [3] It can eliminate the need for VPNs by providing a single gateway to access computing infrastructure via SSH, Kubernetes clusters, and cloud applications via a built-in proxy.

  3. Zero trust architecture - Wikipedia

    en.wikipedia.org/wiki/Zero_trust_architecture

    A zero trust architecture (ZTA) is an enterprise's cyber security plan that utilizes zero trust concepts and encompasses component relationships, workflow planning, and access policies. Therefore, a zero trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in place for an enterprise as a ...

  4. Zscaler - Wikipedia

    en.wikipedia.org/wiki/Zscaler

    Zscaler's Zero Trust Exchange platform features cyberthreat protection, data protection, zero trust connectivity, and business analytics. [12] It was first announced at Zenith Live in June 2023. [13] In January 2024, the company announced Zscaler Zero Trust SASE (secure access service edge), [14] enabling it to offer its first single-vendor ...

  5. Systancia - Wikipedia

    en.wikipedia.org/wiki/Systancia

    Systancia is a European cybersecurity software vendor. Systancia offers solutions to secure external access to systems, and to manage digital identities and authentication processes, as well as an AI-based behavioral biometric authentication platform called "Neomia Pulse".

  6. BeyondCorp - Wikipedia

    en.wikipedia.org/wiki/BeyondCorp

    BeyondCorp utilized a zero trust security model, which is a relatively new security model that it assumes that all devices and users are potentially compromised. This is in contrast to traditional security models, which rely on firewalls and other perimeter defenses to protect sensitive data.

  7. Kiteworks - Wikipedia

    en.wikipedia.org/wiki/Kiteworks

    In August 2022, Kiteworks introduced the Kiteworks Private Content Network, a zero-trust protection and compliance platform for unstructured data communications. [40] In April 2023, Kiteworks announced that it had achieved Cyber Essentials and Cyber Essentials Plus accreditation, the highest standard for IT security in the United Kingdom. [41]

  8. NordLayer - Wikipedia

    en.wikipedia.org/wiki/NordLayer

    NordLayer is based on a cloud-based cybersecurity product that enables organizations to implement secure service edge (SSE) best practices, combining advanced internet access security, network access control, and network connectors into one cohesive solution.

  9. SpiderOak - Wikipedia

    en.wikipedia.org/wiki/SpiderOak

    SpiderOak Inc. is a US-based software company focused on satellite cybersecurity. The company began in 2006 as a producer of a collaboration tool, online backup and file hosting service that allows users to access and share data using a cloud-based server.