Program



    
Track A Time : 2023.9.20 14:40 ~ 15:20
How to implement Document Security Orchestration and Zero Trust Security in a hybrid workplace mail share facebook share twitter share linkedin share band share kakao

Softcamp Co., Ltd
Lee, Kyung Hwa Principal Manager

Data protection is one of the core pillars of Zero Trust implementation. We introduce Document Security Orchestration, which is a leading document-centric security company, to protect collaboration and corporation data in various cloud environments for hybrid work environments. In addition, we will present how to apply Zero Trust Architecture by utilizing web isolation technology (RBI Remote Browser Isolation) technology, which can apply Zero Trust Security Architecture while compensating for the shortcomings of VDI and VPN access-based security.



Softcamp Co., Ltd Booth no : C14
SHIELDGate

Zero Trust is a new security paradigm that starts from the concept of trusting nothing, fundamentally contrasting with traditional security concepts by embracing principles of no perimeter and no trust
It is a conceptual approach that verifies and does not trust any environment, user, or device accessing enterprise resources without proper authentication procedures.
SOFTCAMPs secure remote access service, SHIELDGate, achieves optimal Zero Trust security by combining IAP (Identity Aware Proxy) and RBI (Remote Browser Isolation) technologies.
With the increasing use of virtual private networks (VPNs), security vulnerabilities are becoming more prominent
Extended network access through VPNs can provide attackers with additional attack vectors, and the VPN server itself can become a target of attacks.
In this regard, major issues include vulnerabilities in security configurations, quota overages, weak authentication methods, and unclear access controls.
Additionally, implicit trust in internal users makes it difficult to prevent insider attacks and data breaches.
To address these issues, SHIELDGate, based on the Zero Trust security model, enables secure access from anywhere through a browser without the need for an agent or VPN.
Even in a micro-segmentation environment, using SHIELDGate with conditional access policies applied can block lateral movement by attackers without the need for complex firewall configurations.
It can be used in traditional work system environments, cloud collaboration solutions such as Microsoft 365 and Google Workspace, as well as hybrid work environments.
SHIELDGate implements optimal Zero Trust security by combining IAP (Identity Aware Proxy), which dynamically allows or restricts access to web resources based on the identity and state of the users device, and RBI (Remote Browser Isolation), which treats all web content as untrusted, isolating the users browser and blocking threats.
Through conditional adaptive policies, it continuously authenticates and authorizes all untrusted access activities without installation and without leaving traces.
SHIELDGate plays a crucial role in helping companies protect sensitive data, enhance the security of remote access, and prevent zero-day threats.
Particularly, the browser isolation feature and continuous access activity verification can be seen as distinctive competitive advantages.


Tel : 1644-9366


Email : support@softcamp.co.kr


Homepage : https://www.shieldgate.com