Secure Shield - PwC's Marketplace

Secure Shield

Secure Shield

Secure Shield

Secure Shield

Overview

Powered by blockchain and software-defined perimeter (SDP) technology, the Block Armour Secure Shield solution provides a unified secure access solution that protects access to critical applications in an internal, remote and cloud access scenario simultaneously.

We ensure a secure identity-based-access for the user and the device, policy approved authorised access to critical applications from official and personal devices only if they meet corporate cyber-security baselines and a tamper proof logging mechanism.

Note: To learn more about pricing, please contact us via this product page.



Issues it solves

 
  • Multiple point products need to be deployed in a hybrid ecosystem (on-premise, public cloud, private cloud) environment
  • Vulnerabilities associated with traditional IP-based access solutions (Eg., IPSEC VPN)
  • Propagation of malware/ransomware into corporate network due to zero-day attacks
  • Lack of unified policy based network access mechanism for employees and third party users in a distributed work environment
  • Tampering of logs by malware / ransomware prevents early breach detection
  • Lack of a flexible model of deployment that supports a hybrid network infrastructure
 

Benefits

 
  • Block Armour Secure Shield platform provides simultaneous seamless zero trust network access to distributed applications and resources in on-premise data centres, hosted data centres as well as cloud based servers without the need to logout and login
  • The solution makes the critical application infrastructure invisible to the network, reduces attack surface and thus protects servers and applications from Zero Day and Unknown Vulnerability exploitation attacks. Micro-segmented access policies define just-enough-access to critical systems whether within LAN or outside of LAN
  • The Secure Shield solution performs authentication for both user and device and effectively provides a device posture check based Network Access Control (NAC) capability to ensure just-in-time pre-admission access control to critical applications for compliant devices
  • The platform (Controller) stores all the logs in immutable format which is built on a private-permissioned Blockchain and provides easy integration with Security Information and Event Management (SIEM) and log monitoring solutions. Thus, even administrators cannot erase the log records and any tampering / intrusion attempts are easily detected
  • The Secure Shield endpoint agent filters productive and non-productive traffic based on defined access policy and only sends packets which are destined for target application access based on parameters defined in that explicit policy
 

Recommended for

 
  • Remote and internal employees or 3rd party users; accessing critical servers (deployed across on-premise, public cloud, private cloud, managed service provider cloud) of industry verticals
  • Secure and compliant access to applications hosted in a hybrid infrastructure
  • Banking, Financial Services, Insurance
  • Manufacturing, Engineering
  • Information Technology, Information Technology Enabled Services
  • Enterprises, Corporates
  • Federal, Government
  • Healthcare, FMCG, Retail, Real Estate
 

Price

RM

Need a customised solution?

How it works?

Other products people are interested in

Login

Quick Register

(e.g. Tan / Sri/ Datuk/ Mr /Mrs / Ms etc)