share_log

Intrusion Partners With NetFoundry to Support the U.S. Federal Government's Zero Trust Cybersecurity Standards

Intrusion Partners With NetFoundry to Support the U.S. Federal Government's Zero Trust Cybersecurity Standards

入侵與 NetFoundry 合作,為美國聯邦政府的零信任網路安全標準提供支援
Accesswire ·  2023/03/10 01:32

PLANO, TX / ACCESSWIRE / March 9, 2023 / Intrusion, Inc. (NASDAQ:INTZ) announced its partnership with NetFoundry, creator of the world's most used open source zero trust networking platform, to build a leading Zero Trust Network Access Solution. Intrusion Shield Endpoint helps businesses protect vital data - using zero trust architecture.

德克薩斯州普萊諾/接入線/2023 年 3 月 9 日/入侵公司(納斯達克:INTZ) 宣佈與全球最常用的開放原始碼零信任網路平台創建者 NetFoundry 合作,打造領先業界的零信任網路存取解決方案。入侵防護端點可協助企業使用零信任架構保護重要資料。

"The newly released Federal Cybersecurity Strategy reinforces the Zero Trust Approach and makes it clear that the technology industry must begin to take more responsibility for protecting the public from cybercriminals, and other threat actors," said Tony Scott, CEO of Intrusion. "The continued vitality of the United States economy and its valuable businesses, institutions, and public services will increasingly depend on a much more secure digital infrastructure. The tech industry must take a lead and help shift the burden of poor cybersecurity from the individual to the builders and operators of our technology infrastructure who have the right skills, long-term economic incentives, and the scale to do so. Intrusion is proud to partner with NetFoundry to help accelerate this transformation."

入侵行政總裁托尼·斯科特(Tony Scott)表示:「新發布的聯邦網絡安全策略強化了零信任方法,並明確表明,技術行業必須開始承擔更多責任,以保護公眾免受網絡犯罪分子和其他威脅行為者的侵害。「美國經濟及其有價值的企業,機構和公共服務的持續活力將越來越取決於更安全的數字基礎設施。科技行業必須領導並幫助將網絡安全不良的負擔從個人轉移到我們技術基礎設施的建設者和運營商,他們擁有正確的技能,長期的經濟激勵措施和規模這樣做。入侵非常榮幸能與 NetFoundry 合作,協助加速這一轉型。」

"Intrusion was far ahead of the new Federal Cybersecurity Strategy," said Michael Kochanik, co-founder and CRO of NetFoundry. "We have been working together for some time to integrate NetFoundry's zero trust networking into Intrusion Shield Endpoint, giving immediate benefit to customers."

NetFoundry 的聯合創始人兼 CRO 邁克爾·科查尼克(Michael Kochanik)表示:「入侵遠遠領先於新的聯邦網絡安全策略。我們已經合作了一段時間,將 NetFoundry 的零信任網路整合到入侵防護端點中,為客戶提供立即的利益。」

NetFoundry, the creator of OpenZiti, and provider of CloudZiti. OpenZiti is the world's most used open source zero trust networking platform, and CloudZiti provides Ziti as NaaS, with hosted global network fabrics. Ziti enables developers to embed zero trust networking inside solutions, such as individual apps, APIs, browsers, proxies, and IoT, so that zero trust overlays are integrated into the app, everywhere the app goes, rather than being dependent on underlying networks or clouds.

網絡鑄造公司,開放技術的創造者和雲技術的提供商。OpenZiti 是全球使用最多的開放原始碼零信任網路平台,CloudZiti 提供 Ziti 作為 NaAS,並託管全球網路網狀架構。Ziti 可讓開發人員將零信任網路嵌入到解決方案中,例如個別應用程式、API、瀏覽器、Proxy 和 IoT,以便將零信任覆蓋層整合到應用程式中,無論應用程式走到哪裡,而不是依賴基礎網路或雲端。

Intrusion Shield Endpoint uses a peer-to-peer (P2P) encrypted network overlay that allows users to securely access defined network endpoints via an approved physical device, credentials, and security certificate. The solution adds further protection by blocking all unwanted inbound and outbound communications on each endpoint using the Intrusion Global Threat Engine.

入侵防護端點使用對等 (P2P) 加密網路覆蓋,可讓使用者透過經核准的實體裝置、憑證和安全憑證,安全地存取已定義的網路端點。此解決方案會使用「入侵全域威脅引擎」封鎖每個端點上所有不必要的輸入和輸出通訊,進一步提升防護。

About NetFoundry

關於網路鑄造

NetFoundry transforms secure networking into a developer platform, in the same manner in which cloud transformed compute into a platform. Organizations use the NaaS (CloudZiti) and open source (OpenZiti) options for secure, reliable connectivity for any use case, including APIs, IoT and remote management. With Ziti, network security is no longer dependent on underlying networks, infrastructure and configuration.

NetFoundry 將安全網路轉換為開發人員平台,方式與雲端將運算轉型為平台的方式相同。組織使用 NAs (CloudZiti) 和開放原始碼 (OpenZiti) 選項,為任何使用案例 (包括 API、物聯網和遠端管理) 提供安全、可靠的連線能力。有了 Ziti,網路安全性不再依賴於基礎網路、基礎架構和組態。

Learn more at netfoundry.io

了解更多信息,請參閱網絡

About Intrusion Inc.

關於入侵公司

Intrusion, Inc. is a cybersecurity company based in Plano, Texas. The Company offers its customers access to its exclusive threat intelligence database containing the historical data, known associations, and reputational behavior of over 8.5 billion IP addresses. After years of gathering global internet intelligence and working exclusively with government entities, the company released its first commercial product in 2021. Intrusion Shield allows businesses to incorporate a zero trust, reputation-based security solution into their existing infrastructure. Intrusion Shield observes traffic flow and instantly blocks known malicious or unknown connections from entering or exiting a network to help protect against zero-day and ransomware attacks. Incorporating Intrusion Shield into a network can elevate an organization's overall security posture by enhancing the performance and decision-making of other solutions in its cybersecurity architecture.

入侵公司是一家位於德克薩斯州普萊諾的網絡安全公司。該公司為客戶提供其獨家威脅情報數據庫的訪問權限,其中包含超過 85 億個 IP 地址的歷史數據,已知關聯和聲譽行為。經過多年的收集全球互聯網情報並專門與政府實體合作,該公司於 2021 年發布了其首款商業產品。入侵防護可讓企業將零信任、以信譽為基礎的安全性解決方案整合到其現有的基礎架構中。入侵防護可觀察流量流量,並立即封鎖已知的惡意或未知連線進入或離開網路,以協助防範零時差和勒索軟體攻擊。將入侵防護納入網路中,透過增強其網路安全架構中其他解決方案的效能和決策,從而提升組織的整體安全性態勢。

Cautionary Statement Regarding Forward-Looking Information

有關前瞻性資料的警示性聲明

This release may contain certain forward-looking statements, including, without limitations, comments about the performance of protections provided by our Intrusion Shield product and any other words that react to management's expectations regarding future events and operating performance. These forward-looking statements speak only as of the date hereof. They involve several risks and uncertainties, including, without limitation, the chances that our products and solutions do not perform as anticipated or do not meet with widespread market acceptance. These statements are made under the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995 and involve risks and uncertainties which could cause actual results to differ materially from those in the forward-looking statements, including risks that we have detailed in the Company's most recent reports on Form 10-K and Form 10-Q, particularly under the heading "Risk Factors."

此版本可能包含某些前瞻性陳述,包括但不受限制,對於我們的入侵防護產品提供的保護效能的評論,以及對管理層對未來事件和營運績效期望做出反應的任何其他詞彙。這些前瞻性陳述僅在此日期發言。它們涉及多種風險和不確定性,包括但不限於,我們的產品和解決方案無法如預期般運行或未能達到廣泛的市場接受程度。這些聲明是根據 1995 年《私人證券訴訟改革法》的「安全港」規定作出的,涉及風險和不確定性,這些可能導致實際結果與前瞻性陳述中的重大不同,包括我們在公司最近發表的 10-K 表和 10-Q 表報告中詳述的風險,特別是在「風險因素」標題下。

IR Contact:

紅外線聯絡人:

Alpha IR Group
Mike Cummings or Sam Cohen
INTZ@alpha-ir.com

阿爾法紅外集團
邁克·卡明斯或薩姆·科恩
INTZ@alpha-ir.com

Media Contact:

媒體聯絡人:

LaunchTech Communications
Sara Knott
sknott@golaunchtech.com
540-764-0043

朗昌科技通訊
莎拉·諾特
sknott@golaunchtech.com
540-764-0043

SOURCE: Intrusion, Inc.

來源: 入侵公司


View source version on accesswire.com:
檢視網站上的原始碼版本:

譯文內容由第三人軟體翻譯。


以上內容僅用作資訊或教育之目的,不構成與富途相關的任何投資建議。富途竭力但無法保證上述全部內容的真實性、準確性和原創性。
    搶先評論