EZ VPN Inc. Launches the First Cloud Remote Access VPN Service

EZ VPN | October 22, 2020

As we begin to shift towards a growing remote workforce, there is much to consider regarding the accessibility of corporate network devices from home. Following such demands would require a Virtual Private Network - a network that permits access to data, resources, and information through a remote site. As this often would require IT personnel to configure, the results are costly and complicated for companies to pursue. Establishing a connection that is both simple and secure is the solution that businesses are in desperate need of. Fortunately, a solution has been developed from those at EZ VPN Inc. who recently launched the first cloud remote access VPN service.

Spotlight

We think Desktop virtualization should be easy. That's why we teamed up with Microsoft to create platforms and solutions that simplify desktop virtualization. HAL is replaced by a Hypervisor and the operating system and virtual machines access the hardware through the hypervisor. So essentially the hypervisor is a HAL with additional features required for virtual machines.

Spotlight

We think Desktop virtualization should be easy. That's why we teamed up with Microsoft to create platforms and solutions that simplify desktop virtualization. HAL is replaced by a Hypervisor and the operating system and virtual machines access the hardware through the hypervisor. So essentially the hypervisor is a HAL with additional features required for virtual machines.

Related News

VIRTUAL SERVER INFRASTRUCTURE

Code42 Incydr Supports Leading Desktop-as-a-Service Offerings and Virtual Desktop Infrastructure Solutions

Code42 | September 26, 2022

Code42 Software, Inc., the Insider Risk Management (IRM) leader, today announced its Incydr product fully supports all major Desktop-as-a-Service (DaaS) and Virtual Desktop Infrastructure (VDI) environments. The Code42® Incydr™ product detects when valuable and sensitive files are moved to untrusted locations, including personal email and cloud accounts, and removable media – and allows security teams to quickly respond in order to stop data leaks and theft. According to a recent survey of IT professionals published by Citrix, nearly 70% of organizations are planning to implement VDIs to accommodate hybrid or remote work strategies, with just under 60% accelerating the adoption of cloud tools. Though DaaS and VDI solutions help security teams better protect against vulnerabilities, malicious actors and other external threats, they do little to reduce the risk from insiders, as virtual environments inherently depend on cloud tools. “We’ve seen a notable uptick in the number of teams that have deployed DaaS and VDI solutions throughout their environments. Given the continued popularity of bring-your-own-device (BYOD) and remote work, coupled with an unstable hardware supply chain, we absolutely expect this trend to continue, In virtual-first organizations where there is pervasive use of cloud collaboration tools, such as Git, Salesforce, GDrive, OneDrive and iCloud, Incydr wraps a layer of protection around data put at risk by insiders, complementing solutions that focus on external threats and malicious actors.” Rob Juncker, CTO of Code42 Code42 Incydr: The Industry’s Leading Data Security Product for Exfiltration Detection and Response Incydr is an Insider Risk Management solution that provides the visibility, context and controls needed to stop data leak and IP theft. Organizations utilize Incydr to detect and respond to data exposure and exfiltration from corporate computer, cloud and email systems. It deploys in hours so security teams can address material risk to the business in a matter of days and drive the secure work habits needed to decrease how often employees put data at risk in the future. Code42 Instructor: Education-Led Insider Risk Response The Code42 Instructor™ micro-learning solution improves Insider Risk awareness by focusing on the creation of holistic, security-oriented cultures. The solution delivers actionable, hyper-targeted and bite-sized video lessons to end-users when they’re needed most, helping to change security behavior for the long term. The Instructor solution helps organizations rapidly mature their Insider Risk Management programs by incorporating data-driven Insider Risk behavioral guidance for end-users. Combining the Power of Incydr and Instructor Instructor works in tandem with Incydr, allowing security, compliance and education teams to immediately send corrective video lessons triggered by employee actions that create risk for the business. For example, when Incydr flags file movement to an untrusted location, like an unauthorized cloud application, an Instructor video specifically explaining the correct activity is sent to educate the employee in real-time through the Incydr solution. Code42 Services: Measure, Manage, Mitigate IRM technology is simpler and faster to deploy than other technologies, such as DLP and CASB, but it does require a strategy and mindset shift. Insider Risk Management isn’t only about data – it’s about a company’s employees and culture. Code42 IRM Services are designed to help organizations establish an efficient and effective IRM program rooted in transparency, training and technology. Code42’s services take a collaborative approach to helping organizations develop, operationalize, and mature an end-to-end IRM program. About Code42 Code42 is the leader in Insider Risk Management (IRM), offering end-to-end data loss detection and response solutions. The Code42 Incydr product is native to the cloud and rapidly detects data exposure, loss, leak and theft as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. Accelerating the effectiveness of Insider Risk programs are the Code42 Instructor microlearning solution, and Code42’s full suite of expert services. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. Designed to meet regulatory control requirements, Code42’s IRM solution is FEDRAMP authorized and can be configured for GDPR, HIPAA, PCI and other compliance frameworks. Innovative organizations, including the fastest-growing security companies, rely on Code42 to safeguard their ideas. Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NewView and Split Rock Partners. Code42 has played a defining role in developing a vision and requirements for the IRM category – now recognized by Gartner, IDC and Forrester – and is a founding member of the annual Insider Risk Summit and Insider Risk Community. The Company has several offices across the United States and its clients include large multinational organizations, such as Crowdstrike, Exabeam, BAYADA Home Health Care, Juniper Networks, Lending Club, MacDonald-Miller, MACOM, North Highland, Ping Identity, Shape Technologies, Snowflake, University of Georgia, User Testing, UTEX and Xactly.

Read More

VIRTUAL DESKTOP STRATEGIES

SecureAuth Announces Arculix Universal Authentication Fabric™ to Strengthen Passwordless Continuous Authentication

Arculix | November 21, 2022

SecureAuth, a leader in access management and authentication, today announced its Arculix Universal Authentication Fabric to further strengthen the technology to enable organizations for passwordless continuous authentication. Arculix Universal Authentication Fabric is a technology framework that delivers authentication driven by AI/ML behavioral modeling, continuous risk scoring and eliminates logging in making passwords obsolete. For users, it’s a one-and-done event for accessing their relevant apps, VDI or SSO. For companies, it’s a robust authentication with continuous authentication in the background without any friction to the user. “Historically, a single source to define and administer policy and processes for all users has been absent, Fraud, credential stuffing and attacks will continue to evolve as bad actors thwart existing security approaches. SecureAuth’s Universal Authentication Fabric delivers the first risk-based analytics approach as a consolidated backbone for continuous, multi-factor, and passwordless authentication with the highest level of security as well as a frictionless experience for users.” Paul Trulove, CEO of SecureAuth Between authenticating to the workstation, an SSO portal or federated web apps, VDIs, VPN, and PAM solutions, the typical user authenticates 16 times a day using three different sets of username and password. This is simultaneously insecure and a poor user experience. With Arculix Universal Authentication Fabric, users can login once and securely access the applications needed to do their job. Arculix Universal Authentication Fabric allows users to attain a level of assurance needed to authenticate with its patented behavioral AI/ML risk analytics engine. To ensure there is no account takeover (ATO), it generates a score at the beginning of a user logging in that is used to grant access to web apps, servers and services without requiring another factor check. This removes the need for siloed systems to authenticate users. “SecureAuth’s Arculix Universal Authentication Fabric is the underlying element for the new 360-degree cybersecurity perimeter that every enterprise needs: Continuous, Holistic and Adaptive,” said Alfredo Estirado, CEO of Grupo TRC. “As a key partner of SecureAuth, we are excited to offer this to our customers across various geographies.” Key capabilities include expansion of passwordless features into endpoints, including access to persistent and non-persistent VDIs, in the same passwordless way a user authenticates to a standard machine. This enables a passwordless authentication journey whether in or out of the office. This Universal Authentication Fabric also supports our device trust support for seamless passwordless authentication for transient virtual desktops and physical desktops. About SecureAuth Corporation SecureAuth is a next-gen access management and authentication company that enables secure and passwordless continuous authentication experience for employees, partners and customers. With the only solution that can be deployed in cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world.

Read More

SERVER VIRTUALIZATION

Cogent Announces Definitive Agreement to Acquire T-Mobile's Wireline Business

Cogent | September 12, 2022

Cogent Communications Holdings, Inc. announced today that it has entered into a definitive agreement to acquire T-Mobile's Wireline Business. Cogent's commitment to serving the Wireline Business customers it is acquiring through this transaction will cement the future for this strong legacy business as T-Mobile continues its strategic focus on providing wireless solutions to consumers and enterprises as the core of its future growth. For Cogent, acquisition of T-Mobile's Wireline Business is expected to be an ideal strategic fit with its existing business. The Wireline Business offers the legacy Sprint U.S. long-haul network that provides an owned network asset to complement and eventually replace Cogent's current leased network and provides the ability to expand its product set, including the sales of optical wave transport services to new and existing customers. It also has a current customer base who are a fit for Cogent's products and services, and a group of experienced employees with the knowledge and capabilities to execute the company's strategy. As part of the agreement, in addition to the fiber network and related assets and customers, Cogent will acquire certain liabilities associated with the business. In addition, at the closing of the acquisition, the parties will enter into a separate agreement pursuant to which Cogent will offer IP transit services to T-Mobile for 54 months following the closing date and T-Mobile will pay Cogent $700 million for such services, with $350 million due in equal payments over the first 12 months after closing and $350 million due in equal payments over the remaining 42 months. Cogent expects to offer customers the ability to migrate from their legacy MPLS VPN solutions to modern Ethernet / VPLS or SD-WAN / DIA solutions for their corporate needs. Cogent also expects to facilitate the migration of netcentric internet access customers from the T-Mobile Wireline Business (legacy Sprint) AS1239 to Cogent's AS174. A newly formed direct subsidiary of Cogent will consummate the acquisition. Cogent does not plan to issue new debt or equity in order to finance the acquisition, and the transaction is not expected to be dilutive to Cogent's existing stockholders. Cogent plans to maintain its current dividend per share, which is expected to continue to increase over time. Houlihan Lokey served as the exclusive financial advisor to T-Mobile and T-Mobile was represented by Joseph Alexander, Nancy Victory, Marc Samuel and Jason Juall from DLA Piper. Once registered, participants will receive the dial in number along with a unique PIN. Each individual caller will require their own unique PIN. To ensure timely access, participants should register promptly and dial in approximately 5 minutes before the call starts. A listen only webcast is accessible under "Events" in the "About" section of Cogent's About Cogent Cogent is a facilities-based provider of low cost, high speed Internet access and private network services to bandwidth intensive businesses. Cogent's facilities-based, all-optical IP network provides services in over 219 markets across 51 countries.

Read More