Firewalls focus on keeping things out.
This is a game-changing way of turning the tables on would-be attackers.” – Kerry Kelley, former CIO of US Strategic Command
Find out how to reduce your attack surface by 99.9% with the limiting of data-transmission ranges.
This is a nice and clean approach to reducing the exposure surface, and well worth implementing broadly.” – Dr. Harry Saal, Founder, Network General
Default data travel limits are set to “global” allowing key databases and systems to exfiltrate when even the slightest human error or misconfiguration exists
Instead of Keeping Hackers Out, we Keep Data In.
Data Ex-filtration Protection Limits Data Travel distance
A Silent Tripwire Alarms When Data Tries to Escape, Creating an Invisible Leash
Three Tier Security Architecture
Visibility and Vulnerability analysis, session mapping, packet collection, performance logs and archive
Policy builds spheres of protection for source IP, destination IP, protocols, ports, applications, etc.
Control is the enforcement of policy on a device, aggregation point or network edge