fbpx

Representative offices: 

Request callback
btn

Модель Zero Trust і система DLP: що нового розповіли наші представники та партнери на міжнародній конференції «Digital Change & Customers — Цифрові зміни та клієнтський сервіс»

Release

12 серпня відбулася офлайн-конференція, організована Міжнародним Фінансовим Клубом «Банкір» і покликана підтримати представників фінансового, державного та страхового секторів у боротьбі з кіберзлочинністю шляхом обговорення наявних проблем фінтеху та представлення новітніх та дієвих рішень, спрямованих на покращення вразливого становища сучасних систем кібербезпеки багатьох державних підприємств, а зокрема банків.

На заході пролунали змістовні та по-своєму новаторські виступи від представниці iIT Distribution, pre-sales менеджерки Іни Лазаренко та нашого партнера, pre-sales менеджера GTB Technologies Олександра Погребного. Вони під новим кутом поглянули на шляхи ефективного впровадження моделі Zero Trust і системи DLP, які є чи не першочерговими «маст хев» рішеннями для оптимізації кіберсередовища компаній, особливо тих, що перебувають у тотальній залежності від цілісності й конфіденційності своїх баз даних.

На правах партнера заходу виокремимо важливі тези щодо вищезазначених тем:

  • Рішення ZTNA (Zero Trust Network Access — Нульова довіра під час доступу до мережі) допомагає організаціям забезпечити більш ефективний спосіб впровадження ІТ безпеки, заснований на принципі «ніколи не довіряємо, завжди перевіряємо».
  • Досі існує значний розрив між потенціалом технологій ZTNA і фактичним використанням, можливостями, впровадженням і результатами.
  • Для досягнення рівня Zero Trust Network Access потрібні: поділ площини даних і площини управління, покращений механізм аутентифікації користувачів, доступ на рівні додатку.
  • Нова платформа ZoneZero від Safe-T здатна задовольнити всі ці потреби. До того ж вона підтримує існуючі рішення VPN, позбавляє від необхідності змінювати процедуру доступу й структуру мережі, а також дозволяє організаціям підтримувати всі сценарії доступу. Дізнатися більше про ZTNA від Safe-T.

  • Будь-яка компанія, якій важлива конфіденційність власних даних, рано чи пізно вирішує впровадити DLP-систему (Data Loss Prevention – Запобігання витокам інформації), цінність якої полягає в забезпеченні мінімізації ризику витоку конфіденційної інформації через різноманітні канали.
  • Сучасна повноцінна система DLP повинна підтримувати гібридну працю, тобто можливість адаптувати політики до роботи з офісу чи з дому.
  • Наразі одним з основних викликів для розробників DLP-систем є впровадження повної підтримки роботи із зображеннями, оптичне розпізнавання символів (іншими словами — підтримки роботи ОЦР модулю на всіх каналах витоку даних).
  • Важливо прослідкувати та запевнитися в тому, що ваше DLP-рішення здатне підтримувати мультизадачність (захист всього периметру з особливим функціоналом) і гарантувати безпечне розшарення екрану (система має контролювати цю функцію, і в необхідному випадку блокувати її).
  • Ще три корисні фічі вашого ефективного DLP: захист некласифікованих файлів, контроль запису на мобільні пристрої й тіньове копіювання файлів на всіх функціях. Усі ці та вищезгадані можливості здатні забезпечити лише дійсно розвинуті та оптимізовані рішення. Одне з них – GTB DLP Suit від компанії GTB Technologies. Дізнатися більше про рішення від компанії GTB Technologies.

iIT Distribution — офіційний представник виробників ПЗ для кібербезпеки. Компанія iIT Distribution спеціалізується на рішеннях інформаційного захисту. Ми не тільки постачаємо програмне забезпечення та технічне обладнання, а й забезпечуємо повний комплекс послуг із супроводу проєктів.

Back

We invite you to the international conference "Digital Change & Customers”

Release

In modern realities, banking cybercrime is no longer just a problem, but a real threat. And even one small mistake on the line of defense against this threat can become fatal for banking systems. Most cybercrime acts fall on the shoulders of the banks, despite the fact that they are the once who remain in a special dependence on the integrity and confidentiality of their databases, and last but not least, on the reliability of the secure operation of the computer systems. [AY2] Banks become particularly vulnerable when they ignore cybersecurity technologies. That is why it's so important to ensure an effective corporate culture in the field of cybersecurity by choosing a high-quality, uninterruptedly reliable IT solution.


To assist the financial sector in solving cybersecurity problems, the International Financial Club «БАНКИРЪ» gathers representatives of the financial, public and insurance sectors, as well as the best experts of the technology industry within the international conference "Digital Change & Customers " on August 12 at the Kyiv convention center INVERIA. Participants will meet within an offline event to discuss new emerging problems of fintech and find the best ways to solve them.


iIT Didtribution (together with the GTB Technologies and Safe-T) as partner of this event provides a valuable opportunity to exchange the experience of implementation of the best solutions for banking cybersecurity, as well as optimization of digital banking.


Alexander Pogrebnoy, pre-sales manager at GTB Technologies, will talk about the flexible and effective DLP (Data Loss Prevention) system , which prevents a leak of information. A DLP solution is valuable in its ability to minimize the risk of confidential data leak through various information channels.

In addition, DLP prevents data leaks from corporate computers by using content filtering techniques in combination with context control technologies. The most advanced DLP systems support optical recognition of data both in movement and in storage (Discovery); have built-in data classification (no need to buy tools from Bolden James or Titus Labs); implement a complete DRM / IRM system as part of the package. And this is not the whole list of the possibilities of this solution.


Although this technology has been known for decades and has been used for a long time, it develops permanently because of the requirements, which are also always growing. Together with Alexander we will talk about new challenges, DLP requirements and what you should pay attention to while choosing this system nowadays.


Our second speaker, Inna Lazarenko, Sales Engineer at iIT Distribution, will talk about the Zero Trust model characterized by a complete distrust in access towards all, even users inside the perimeter. The most advanced Zero Trust solutions change the approach to secure access by providing data-plane and control-plane separation, monitoring and strengthening of the application-plane policy, also MFA integration into any application or service.


We will share our invaluable experience in the area of cybersecurity not only from the stage. Throughout the day, our consultants and first-class specialists will hold product demonstrations, advise on the corporate information security and answer to any questions!


We remind that iIT Distribution is the official distributor of GTB Technologies and Safe-T brands in Ukraine. We work closely with our partners to meet the needs of the end customers and provide full support for the design and implementation of projects. You can always order product testing or get detailed consultation on our website.

Back

Safe-T ZoneZero

Management of the entire perimeter access scheme from a single integrated and easy-to-use platform with patented reversible access technology and a unique ability to implement the ZTNA principle.

Request a demo

Safe-T uses patented reverse access technology installed between deployed product components, creating a "zero trust" zone. Users, devices, and applications will not be able to access the requested information until the connection is allowed and established using a logical one-way connection initiated by the access controller from the corporate network.


With transparent and easy deployment, Safe-T provides an innovative and unique opportunity to implement the ZTNA principle in VPNs, firewalls, and enterprise network application services, helping to integrate solutions into legacy infrastructure and authentication services.

ZoneZero SDP: Software-driven perimeter

The ZoneZero SDP (Software Defined Perimeter) component provides secure and transparent access for all types of objects (users, applications and connected devices) to any internal application, service and data (HTTP / S, SMTP, SFTP, SSH, APIs , RDP and WebDAV). ZoneZero SDP uses Safe-T's patented external loop technology, which allows you not to open input ports in the organization's firewall.


ZoneZero SDP can run in parallel with existing technologies (such as VPN), supports cloud, local and hybrid deployment, as well as scaling and fault tolerance.

Protect access to applications

ZoneZero VPN: Increase network security

Unlike a software-based perimeter, a VPN does not support the concept of "zero trust" and therefore does not share authorization and authentication flows.


The ZoneZero VPN solution changes the approach to secure access, truly providing a division into the data plane and the management plane, monitoring and enhancing policies in the application plane, and integrating MFA into any application or service. ZoneZero VPN is independent of the VPN provider, which makes this component universal.

ZoneZero MFA: Multifactor authentication

One of the important components in the platform is the ZoneZero MFA (Multi-Factor Authentication) solution, which provides constant multi-factor user authentication. The centralized solution approach allows customers to easily integrate multi-factor authentication and authentication awareness into all access scenarios - for remote and internal users, VPN, web and non-web applications.


Features:

  • Built-in MFA or integration with third-party MFA / authentication providers.
  • Support for permanent authentication.
  • Control access to applications for internal users.
  • Options for using "User> Application" and "Application> Application".

ZoneZero SFA: Secure access to file storage

With Safe-T SFA, organizations can transform SMB servers on the principle of Zero Trust Network Access, eliminating direct access to distributed SMB servers and networks and providing the ability to work with important information only on the principle of business necessity.


To provide secure access to the distributed SMB server repository using HTTPS only, SFA acts as a distributed file system proxy for Microsoft Windows SMB servers, using the ADFS authentication mechanism that allows users to authorize domain credentials and inherit already configured rights. access to network repositories used within the corporate network.

Secure file access

Usage scenarios

Segmentation of the company's internal infrastructure

Secure remote access with support for adaptive 2FA, MFA

Organization of secure remote access for contractors and remote employees

Secure data transfer to a secure network

Secure access to SMB file storage from public networks (SFA)

Zero Trust, The Right Way!

MAIN BENEFITS OF THE SOLUTION

Integration with all modern solutions for multifactor authentication, including biometrics.

Integration with all market analysis tools (UEBA, SIEM, SOC).

Patented reverse access technology allows you to initiate the transmission of traffic not by an authorized user, but by the access controller Safe-T.

Physical separation of data streams and continuous authentication provides protection against hacking at the architectural level.

Easy to deploy (virtual machines) and administration.

Microsegmentation to the elementary level "application - user".

Continuous monitoring of access to the company's resources.

Work without agents.

The ZTNA model helps reduce the stress loading of employees from remote work

Articles and reviews

As a result of the current pandemic, there are more and more people who must adapt to working at home. At the same time, many businesses are beginning to realize that these changes can be long-term.


Recent report of Gartner "The Best Networking Solutions for Telecommuting " (September 2020), contains a chart showing the percentage of employees who worked remotely before the pandemic and now. As you can see, the number of such employees has grown.

Not only do individual workers struggle with sudden changes and do their best to maintain efficiency in the new environment, but a significant portion of the problems are borne by the business itself. Companies are trying to adapt to the reality of remote workers, which are growing at an unprecedented rate.


In particular network security and network monitoring can create unforeseen difficulties for people who work remotely. Most corporate networks are not designed to handle the sudden increase in remote user activity, which can lead to errors and network disruptions, leading to security, functionality, and financial problems. Traditional solutions for network security and network monitoring fail to provide the necessary corporate requirements for users working from home. Therefore, companies must focus on ensuring the highest level of network security.


The Gartner report includes a recommendation section that includes a recommendation and how network security evolves towards zero-trust network access (ZTNA) principles. ZTNA is a service or product that allows users to securely access the services of an organization with the assurance that no attacker can gain access to applications. Under this model, users, devices, and applications are subject to validation every time they request access to any corporate resource.

Part of the functionality of ZTNA includes the provision of VPN, in addition to other services. ZTNA develops speed, flexibility and adaptability for remote access at a relatively affordable cost. To facilitate the remote user experience and reduce unnecessary traffic, ZTNA can be used as a powerful tool. It will help you successfully improve the security of your network and help reduce security risks or external tampering. Therefore, ZTNA is the ideal model for providing users with uninterrupted access without compromising security.


As corporate security experts, we recommend using ZoneZero from Safe-T. It is not only compatible with most of the leading VPNs that you likely already have in your organization, but it is also compatible with other components of your current network, including security solutions. ZoneZero provides users with authentication based on various factors, increasing the level of security and reducing the likelihood of threats. The solution also offers the ability to migrate from network access to application access to ensure users are not online.


The original source

Back

Mobile Marketing
+
en_GBEnglish