ComputerVault Cybersecurity is designed to prevent malware/ransomware infections, stop phishing attacks and protect an organization’s data. The cybersecurity posture is based on three areas:
All three of these areas are built into the architecture. While a Zero Trust Security Model is considered ideal, retrofitting one is difficult to apply to existing infrastructures. ComputerVault Hyper-converged Infrastructure software was built on a Zero Trust Security Model from the beginning. So, there is no need to migrate or patch one together.
ComputerVault has a true zero trust security model with no trusted domains, devices or users. Every user, device and domain must be Authenticated, or access is denied. Once authenticated, access to any resource requires Authorization at the user and device level.
Furthermore, every endpoint device in a ComputerVault environment is considered compromised with malware. Yet, ComputerVault is designed to function safely even when this is true. This is because endpoint devices may connect only to the Internet or a ComputerVault Virtual Desktop. However, no uploads from the endpoint device to the virtual desktop is allowed. The virtual desktop acts as a buffer between data and resources and the endpoint device and its malware.
Downloads, by default, from the virtual desktop and the endpoint device are also prohibited. This is a data privacy issue, so that data is maintained only within the IT infrastructure.
These measures reduce the attack surface for the most common threats, i.e., the endpoint device and the end user, to maintain data and resource integrity. By assuming that all endpoints are compromised, they are removed as a vulnerability.
ComputerVault HCI contains its own native, fully programmable, virtual networking solution, which does not require any third-party network gear or other software to create LAN’s and SD-WAN’s.
It contains functions such as:
Access to existing resources occurs from a ComputerVault Virtual Desktop, or Server, through the existing firewall. Data remains within the datacenter, and ComputerVault works with the existing firewalls and cybersecurity infrastructure, without the need for Rip ‘n Replace.
The Zero Trust Security Model and the Software Defined Perimeter are augmented by Advanced Cybersecurity designed to:
All of the above features are deployed and maintained by the ComputerVault Administrative Console to ensure safe and continued operations.