Yesterday, Cato Networks introduced its new risk-based application access control for combatting the threat of infiltration posed by remote workers and Bring Your Own Device (BYOD). Now, enterprise policies will be able to consider real-time device context when restricting access to certain capabilities within corporate applications, the internet and cloud resources.

“User devices can be notoriously unprotected, opening a backdoor into enterprise networks,” says Eyal Webber-Zvik, vice president of product marketing at Cato Networks. “Today’s announcement allows IT to deliver just the right degree of application access to minimize the risk of breach without compromising user productivity.”

Cato Converges Device Context Across SPACE

With the evolving threat landscape, user identity alone is no longer sufficient for ZTNA or BYOD risk assessment. Identities can be spoofed while personal devices may not conform to enterprise security standards. Organisations are increasingly looking for an enforcement solution with the contextual awareness to balance user productivity with risk mitigation.

To address this challenge, Cato is embedding continuous device context assessment throughout the Cato Single Pass Cloud Engine (SPACE), Cato’s converged, cloud-native software stack. This new offering gives organisations the ability to continuously assess the posture of a user’s device. As such, security teams will be able to take action when the device falls out of compliance.

By exposing context attributes through Cato SPACE, they become available across all current and future Cato capabilities, in this way enabling granular control over user application access. For example,

Device context attributes include anti-malware type as well as the presence of a client-side firewall, full disk encryption, patch levels, and more. Additionally, the Cato Client gathers information by the industry-leading OPSWAT OESIS framework.

 

The post New Risk-based Application Access Control aims to solve BYOD and Remote Work Security and Productivity Challenges appeared first on IT Security Guru.

source

You May Also Like

Ukraine’s request to block Russia’s internet rejected

As Russia invaded Ukraine, the besieged country asked  the Internet Corporation for…

Ukraine’s “IT Army” hit with info-stealing malware

Security researchers have warned pro-Ukrainian actors of employing DDoS tools to attack…