Virtual Desktop Tools

GoodAccess Offers Protection Against Online Threats With its Built-in Threat Blocker Feature

GoodAccess_Offers_Protection
GoodAccess, an anytime-anywhere zero-trust remote access company, has added the Threat Blocker feature to its platform. Threat Blocker enables businesses to provide network security on the public internet and protect remote employees from dangerous domains, phishing attempts, malware and network attacks.

Threat Blocker is a native feature of the GoodAccess platform and is automatically enabled for all customers with no additional setup required. It uses several threat intelligence feeds to identify and block connections with malicious domains in real-time (so-called DNS filtering). The feeds are constantly updated with the latest information on malicious domains, so businesses can be confident that their employees are protected from the newest threats.

Threat Blocker is an important addition to the security features of our platform. When phishing, ransomware, and other online adversary techniques are still at large, GoodAccess Threat Blocker will help businesses to elevate their security posture against them and reduce the attack surface introduced by remote work."

Artur Kane, CMO at GoodAccess

For monitoring and compliance reasons, employees' access to harmful websites and content is tracked and logged. Also, GoodAccess users can define their custom domain blacklists (denylists) to strengthen their security controls.

The new feature helps businesses to:

  • prevent employees from accessing malicious websites and keep their data safe and secure,
  • block malware before infiltrating business network and launching larger attacks (advanced persistent threats, APT),
  • detect and block connections with C&C botnet networks,
  • prevent ransomware attacks to keep data safe and systems up and running,
  • prevent unauthorized access to the business network as a result of successful phishing and identity theft,
  • reduce the risk of sensitive business data exposure.

GoodAcces cloud VPN with zero-trust network access controls streamlines the way organizations handle remote networking and mitigates security risks introduced by distributed workforce, constant mobility and decentralized IT. Since 2020, GoodAccess has earned the trust of more than 1000 business customers from 120 countries worldwide.

Spotlight

Spotlight

Related News

Virtual Server Management

EMA and Auvik Research Reveals Hybrid and Remote Work Has Increased Workloads, Posed Challenges to Remote Network Experiences

Business Wire | September 28, 2023

New research by Enterprise Management Associates (EMA) and Auvik, an award-winning provider of cloud-based network management software, revealed that the ongoing shift to hybrid and remote work environments has resulted in key changes to the roles and priorities of network administrators in order to address new connectivity challenges and prioritize and preserve a secure, productive end-user experience. The report examined the remote and hybrid work paradigm through the lens of network operations teams – 73% of which reported an increase in workloads, either slightly or significantly, following the shift from traditional to hybrid work environments. Results from the report demonstrated that the top challenges associated with the remote work experience are poor home Wi-Fi setups, distance from applications, and poor ISP quality. To combat these obstacles, 72% of surveyed organizations have deployed network hardware to the homes of remote workers, including network security devices (62.7%) and Wi-Fi access points (54.1%). Additionally, 90% of organizations with hybrid workers shared that they had to upgrade Wi-Fi networks to address increased office mobility requirements. “These results reinforce that although people are beginning to return to the office, hybrid work is here to stay and is resulting in significant changes for network administrators,” said Alex Hoff, co-founder and Chief Strategy Officer for Auvik. “Although IT teams no longer own all the assets utilized daily by employees, they are still responsible for these operations. And despite not being able to directly exert control over employees’ home networks, they can have visibility over these environments with network monitoring tools. Implementing network visibility software helps IT professionals overcome these new obstacles by providing the ability to maintain visibility and control amid changing work circumstances. The data provided in this report reinforces Auvik’s place in the market and demonstrates that our recent acquisitions, integrations, and expanded product offerings that were designed to help IT teams adapt to these new norms are well-suited for the challenges that are being identified within the industry.” Additional findings from the report include Nearly 49% of network operations teams started working with a new tool vendor to help them manage the network experience of remote workers. 76% of organizations need to unify how they manage network access policies across on-premises networks and remote users. Remote desktop access tools (deployed by 81% of companies) remain the go-to solution for troubleshooting remote users’ problems, but endpoint monitoring tools are increasingly popular (79%). Although 87% have allocated funds in their budget to update network operation tools for remote and hybrid user support, only 32% of organizations shared that they have been successful in doing so. The top issues employees most often report when they are working from home are VPN access issues, followed by performance issues with SaaS applications. “96% of IT organizations said they are supporting hybrid workers, and 30% of all employees who work remotely are hybrid workers,” said Shamus McGillicuddy, VP of Research, EMA. “With employees working both at home and in the office, it is important to have the assets and software necessary to support them in both locations. This means enterprises must invest in more secure remote access solutions that offer integrated network security automation, centralized management, and network optimization or network enhancement, as well as network observability tools that are able to monitor performance across disparate locations.” Methodology Auvik commissioned an independent research firm to survey 354 IT professionals directly involved in supporting the networking requirements of employees who work from home. About Auvik Auvik’s mission is to simplify how IT teams work and live by providing cloud-based IT monitoring and management with simplicity and speed. It lets IT professionals visualize IT infrastructure, SaaS applications, and shadow IT in minutes. As a result teams can identify and resolve issues in seconds, saving valuable time. Auvik is one of the fastest-growing North American technology companies, and is winner of the Deloitte Technology Fast 50 and Deloitte Fast 500. Visit www.auvik.com for more details. Auvik is a registered trademark of Auvik Networks Inc. About EMA Founded in 1996, EMA is a leading industry analyst firm that specializes in providing deep insight across the full spectrum of IT and data management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help their clients achieve their goals.

Read More

Backup and Disaster Recovery

Minimize the Cost and Downtime of Disaster With Scale Computing's Business Continuity/Disaster Recovery Planning Service

PR Newswire | October 25, 2023

Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced its Business Continuity/Disaster Recovery (BCDR) Planning Service, designed to help organizations establish a comprehensive, regulated plan for responding to unforeseen downtime. The service provides Scale Computing customers and partners with the tools, guidance, and resources to create a playbook for data backup and recovery, enabling businesses to endure a disaster scenario with minimal loss. Scale Computing also recently announced that it is a finalist for the Business Continuity/Disaster Recovery Project of the Year in the 2023 SDC Awards for its work with Austrian managed service provider GiGaNet and its long-time partner the Zillertaler Gletscherbahn group. Voting for the SDC Awards is open at sdcawards.com/vote until November 10th, 2023. Data breaches are one of the biggest and most costly contributors to downtime for businesses. In 2023, the average cost of a data breach globally reached an all-time high of $4.45 million, a 15.3% increase from 2020. Simultaneously, the average length of business disruption following a ransomware attack in the United States reached 24 days last year, up 60% from just two years prior — a significant increase when downtime costs exceed $300,000 per hour for over 90% of mid-sized and large enterprises. For more than half of those businesses, the hourly outage costs range from $1 million to over $5 million. Recovery from an outage adds additional expense from which many enterprises are unable to bounce back. "Disaster can strike at any time, and every organization needs a consistently regulated playbook for how the business will respond — from action plans to recovery plans for bringing online the mission-critical servers businesses depend on," said Jeff Ready, CEO and co-founder, Scale Computing. "Knowing what systems need to be protected, planning for the ability to recover them, and having a full action plan for recovery should be at the forefront of every IT department's agenda, at the beginning of any infrastructure addition. With Scale Computing Platform, the plan for disaster recovery starts before equipment is even put into production, so IT leaders have a plan in place from day one that they can enact to ensure their business stays up and running, with minimal loss, should disaster strike. Our Business Continuity/Disaster Recovery Planning Service enables businesses to proactively classify systems based on their importance and implement a robust action plan, ensuring that our customers' and partners' critical systems are protected, validated, tested, and ready for recovery at any time." Whether a minor data loss or a business-wide shutdown, having a well-defined business continuity strategy is crucial to minimize financial impact, ensure continuous employee productivity, meet compliance and regulatory requirements, decrease liability obligations, reduce downtime, and minimize the risk of negative exposure. Scale Computing's BCDR Planning Service includes planning, deployment, documentation creation, and disaster recovery testing, covering every aspect to keep businesses prepared and resilient. The service is offered to Scale Computing Platform customers, which brings simplicity, high availability, and scalability together to replace existing infrastructure for running virtual machines with an easy-to-manage, fully integrated platform that allows organizations to run applications regardless of hardware requirements. About Scale Computing Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore™ technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest-growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing's products are sold by thousands of value-added resellers, integrators, and service providers worldwide.

Read More

Backup and Disaster Recovery

Expedient Announces Partnership with Kyndryl to Deliver Disaster Recovery as a Service

PR Newswire | October 03, 2023

Expedient, a Full-Stack Cloud Service Provider, announced a partnership with Kyndryl the world's largest IT infrastructure services provider. Through this collaboration, Expedient's robust data center colocation and cloud infrastructure will enhance Kyndryl's industry-leading cyber resilience offerings to customers. By joining forces with Kyndryl, Expedient is extending the reach of its state-of-the-art data center colocation and cloud infrastructure known for its reliability, scalability, and security capabilities. Expedient's award-winning infrastructure is an integral element of its Cloud Different™ multi-cloud services and is delivered across a nationwide network of highly interconnected data centers. Infrastructure is available in dedicated, private cloud, and VMware-based Expedient Enterprise Cloud configurations to meet the needs of customers and prospects across regions and industries. This partnership will enable Expedient and Kyndryl to extend the reach and effectiveness of security and cyber resilience services to a wider range of customers, helping organizations across various industries strengthen and fortify their cybersecurity posture while further mitigating the risks associated with data breaches. "We are excited to partner with Kyndryl, a company known for its excellence in cybersecurity services, cyber resilience services and Disaster Recovery as a Service," said Dennis Musolino, Chief Revenue Officer of Expedient. "Expedient has a more than 20-year history and expertise in delivering unmatched disaster recovery and data center infrastructure solutions. We are proud and excited to be providing our data center and cloud infrastructure to help augment the comprehensive resiliency services that Kyndryl delivers to its array of clients nationally. Together, we will empower businesses to proactively protect their digital assets and maintain operational resilience in an increasingly complex digital landscape." "We're dedicated to helping customers navigate their ever-evolving cybersecurity challenges," said James Carrigan, Jr., VP, US Security Practice Leader at Kyndryl. "Partnering with Expedient will allow us to further provide our customers with access to a flexible, robust and security-rich infrastructure that supports their cybersecurity and cyber resilience needs and enables the uptime and availability of their most critical applications." About Expedient Expedient is a full stack cloud service provider, helping companies transform their IT operations through award-winning multi-cloud solutions and managed infrastructure services including enterprise cloud, disaster recovery, virtual desktop infrastructure, data center colocation, edge computing, security and compliance, and more. The company's Cloud Different™️ approach provides an on-ramp to the cloud, supporting the optimization and delivery of all applications. Named VMware's Americas Cloud Partner of the Year and acknowledged in Gartner's Magic Quadrant for Disaster Recovery as a Service, Expedient eases a customer's transition to the cloud by providing curated and bundled best of breed solutions backed by "white glove" services and support. Expedient data centers are compliant with a variety of regulatory mandates, including the Health Insurance Portability and Accountability Act (HIPAA) as well as the Payment Card Industry Data Security Standard (PCI DSS) service.

Read More