Security 365 provides
365 days of secure zero-trust security
in the cloud environment
Security 365, as SOFTCAMPs security cloud service,
achieves zero-trust security through Document Security Orchestration for documents distributed and used internally and externally, and Zero Trust Security for untrusted connections and external threats.
Zero Trust Security
for untrusted connections
In a boundaryless work environment, there is a need for a redefinition of trustworthiness and a transition from traditional perimeter-based security models.
SoftCamp implements zero trust security under the assumption that nothing can be trusted, achieving this through continuous verification of access to all resources within the organization via conditional adaptive policies.
*Conditional Adaptive Policy: Continuously verifies authentication and authorization for all untrusted accesses.
Why is Zero Trust Security necessary?
Importing untrusted external files.
Accessing untrusted internet
content.
Would you allow everything with a single judgment?
Security management is necessary even after allowing access.
Internal access of
an untrusted
device.
Zero Trust Security Strategy
Remote Browser Isolation
Filtering and Transformation of Internal Ingress Content
Conditional Access and Usage Policies Based on the Situation
Zero Trust Conditional Access
Minimization of Attack Surface
Zero Trust Security Solutions
Verify Every Access
Browser Isolation Connection
Remote access without changes to existing business systems
Clientless service
01
SHIELDGate
Secure Remote Access
By employing conditional adaptive policies, SHIELDGate continuously verifies authentication and authorization for all untrusted access behaviors without installation or traces, achieving a 'zero trust architecture.'
*IAP and *RBI enhances security through user identity and context-based access control and network segmentation via pixel streaming method.
*IAP(Identity Aware Proxy): Dynamically allows or restricts access to web resources based on user and device identity and status.
*RBI(Remote Browser Isolation): Considers all web content as untrusted, isolates the user's browser, and blocks threats.
02
SHIELDEX File
Inbound File Sanitization
A harmlessness solution that achieves zero-trust security by safely extracting only visible contents from files incoming from untrusted external sources and reconstructing them to mitigate potential threats
It provides real-time transformation using CDR (Content Disarm and Reconstruction) technology for all types of files included in documents, securing against malicious code and zero-day attacks.
Introducing a self-network interlocking module
Optimizing for network isolation environments
Strengthening network-linked security systems
Email body sanitization
Attachment sanitization
URL remote browsing
Providing result reports
03
SHIELDEX Mail
Email Threat Response
An email sanitization solution that safely extracts and reconstructs only the secure visible contents of email content, including body, attachments, URLs, incoming from untrusted external sources.
Through CDR (Content Disarm and Reconstruction) processing of email content, which is the leading distribution path for malicious code, it removes all potential threats in email bodies and attachments.