THE PROBLEM
- Cyber risk is complex and involves multiple layers, including hardware, software, devices, networks, and people. Because of global IP visibility, any device can see and attack any other device unless it is encrypted, and data is spewing out at all layers.
- Also, virtually all malware (~94%) is injected via web browsers.
- The members of AHC are diverse and include enterprises of all sizes, government agencies and NGOs with varying cyber expertise, maturities, systems, devices and requirements.
THE SOLUTION
- The All Hazards Consortium Secure Information Sharing Exchange (SISE) Net “cloaking initiative” enables a highly secure collaboration environment across large numbers of organizations with varying cyber maturity standards/practices.
- Instead of running an app locally where the device processes the code, end-users are authenticated through a web interface into the AHC SISE Net, where they securely access enterprise network and cloud applications, including Microsoft Teams.
- The applications are running in a secure cloud where an image of the data (not the actual data) is streamed to the device over a secure tunnel.
- Includes role-based access and MFA (Multi-factor Authentication) along with continuous monitoring for threats and for compliance with rules of engagement (minimum cyber maturity standards).
- Cloaked environment is continuously monitored (real-time) for threats and for compliance.
THE RESULTS
- Cyber Cloaking's secure application streaming moves the browser to a secure cloud (off devices), which moves the enterprise attack surface and that of its partners and members to a secure environment.
- This extends the secure cloud all the way out to the edge and dramatically reduces the attack surface. Sensitive data never leaves the secure environment.
- Privacy by default.
- Data on user’s device is never exposed.
- Can’t track Individual transactions at the network edge.
FAQs
1) What is the cyber cloaking initiative?
2) What problem does it solve?
3) What benefits does it bring?
1) What is the cyber cloaking initiative?
- The All Hazards Consortium's Secure Information Sharing Exchange (SISE) “cloaking initiative” enables a highly secure collaboration environment across large numbers of organizations with varying cyber maturity standards/practices.
- Instead of running an app locally where the device processes the code, end-users are authenticated through a web interface into the private sector's SISE, where they securely access enterprise network and cloud applications, including Microsoft Teams.
- The applications are running in a secure cloud where an image of the data (not the actual data) is streamed to the device over a secure tunnel.
2) What problem does it solve?
- Invisible IP's: Cyber risk is complex and involves multiple layers, including hardware, software, devices, networks, and people. Because of global IP visibility, any device can see and attack any other device unless it is encrypted, and data is spewing out at all layers. This approach makes IP addresses invisible to the internet and external hackers.
- Immediate Threat Reduction: Virtually all malware (~94%) is injected via web browsers. When implemented, the approach immediately reduces an organization's cyber threat-footprint across all devices that users browsers.
- Diverse Users: The members of AHC are diverse and include enterprises of all sizes, government agencies and NGOs with varying cyber expertise, maturities, systems, devices and requirements.
- Secure Access: Allows end-users to access resources in a secure manner without having to load an application on a device.
- Compliance with Standards: This approach includes role-based access and MFA along with continuous monitoring for threats and for compliance with rules of engagement (minimum cyber maturity standards).
3) What benefits does it bring?
- Secure application streaming moves the browser to a secure cloud (and off of devices), which moves the enterprise attack surface and that of its partners and members to a secure environment. This reduces the cyber attack footprint dramatically, which reduces the overall cyber threat to the organization.
- This extends the secure cloud all the way out to the edge and dramatically reduces the attack surface.
- Sensitive data never leaves the secure environment.
- Data on user’s devices is never exposed which creates data privacy by default.
- Hackers can’t track individual transactions at the network edge.