RevBits , a provider of 360-degree comprehensive cyber defense software, today announced the availability of the RevBits Zero Trust Network (ZTN). RevBits ZTN is a thin client application that offers authenticated access to applications, services and data for remote users and devices, with comprehensive network security.
Remote workforce and third-party access increase security risks for businesses. By moving network protection to endpoints, RevBits ZTN isolates and protects internal assets, without implementing complicated network segmentation.
By supporting a default trustless security posture, RevBits ZTN offers data security in transit through encryption, secure access to applications and services, and network security through user and device authentication.
“As business threat levels increase, rethinking cybersecurity and perimeter control is paramount,” said David Schiffer , CEO of RevBits. “It is no longer about ensuring data encryption for remote users over a VPN as a supplement to network security; organizations must adopt a default posture of no trust.”
Leveraging its technological innovation in the access management market, through award-winning Privileged Access Management (PAM) RevBits ZTN extends access management and control to the individual user level, with unified visibility and analytics, from a single supplier.
Also Read: Ransomware Attacks Surge in 2021 – Are Enterprises Prepared?
Virtual private networks (VPNs) have been the main security tool for remote access. However, the protection of a VPN stops at the perimeter of the network, leaving the internal network vulnerable.
A VPN offers a certain level of protection by encrypting data in transit and implementing an obfuscation layer. However, it does not authenticate users or their devices, leaving the network open to attackers if VPN credentials are stolen.
RevBits ZTN offers data security with encryption and granular access control to digital assets by authenticating all users and devices. “Based on our unique architecture and patent-pending technologies, RevBits ZTN offers the best protection available,” said Mucteba Celik, Chief Technology Officer, RevBits.
“By combining the principles of our PAM solution, RevBits ZTN offers data encryption, comprehensive obfuscation, granular user and machine access control, and monitoring to protect digital infrastructure.”
RevBits ZTN Highlights
- Proxy servers located in 24 cloud regions distributed worldwide for fast and secure connections and automatic scaling.
- Multiple options for user authentication, including fingerprints, facial recognition, YubiKey, SAML, MFA and others.
- Control every aspect of a remote session, including monitoring, reviewing, recording, and logging out with one click.
For more such updates follow us on Google News ITsecuritywire News.