ComputerVault Cybersecurity is designed to prevent malware/ransomware infections, stop phishing attacks and protect an organization’s data. The cybersecurity posture is based on a Zero Trust Security Model.
While a Zero Trust Security Model is considered ideal, retrofitting one is difficult to apply to existing infrastructures. ComputerVault software was built on a Zero Trust Security Model from the beginning. So, there is no need to migrate or patch one together.
ComputerVault has a true Zero Trust Security Model with no trusted domains, devices or users. Every user, device and domain must be authenticated, or access is denied. Once authenticated, access to any resource requires authorization at the user and device level.
Furthermore, every endpoint device in a ComputerVault environment is considered compromised with malware. Yet, ComputerVault is designed to function safely even when this is true. The virtual desktop acts as a buffer between data and resources and the endpoint device and its malware.
Downloads, by default, from the virtual desktop and the endpoint device are also prohibited. This is a data privacy issue, so that data is maintained only within the IT infrastructure.
These measures reduce the attack surface for the most common threats, i.e., the endpoint device and the end user, to maintain data and resource integrity. By assuming that all endpoints are compromised, they are removed as a vulnerability.
ComputerVault contains its own native, fully programmable, virtual networking solution, which does not require any third-party network gear or other software to create LAN’s and SD-WAN’s.
It contains functions such as:
Access to existing resources occurs from a ComputerVault Virtual Desktop, or Server, through the existing firewall. Data remains within the datacenter, and ComputerVault works with the existing firewalls and cybersecurity infrastructure, without the need for Rip ‘n Replace.
The Zero Trust Security Model and the Software Defined Perimeter are augmented by Advanced Cybersecurity designed to:
All of the above features are deployed and maintained by the ComputerVault Administrative Console to ensure safe and continued operations.