Cameyo Extends Its Commitment to Zero Trust Security with New Capabilities & Achieves ISO 27001 Certification
Cameyo, the company that provides simple and secure Virtual Application Delivery (VAD) for any Digital Workspace, announced Secure Cloud Tunneling, a new technology that provides greater protection for organizations enabling remote & hybrid work by eliminating the need to open ports in their firewall – a practice that can increase exposure to hackers and ransomware. Cameyo’s Secure Cloud Tunneling expands upon its native Zero Trust securityย architecture and continues Cameyo’s tradition of providing the most secure access to business-critical applications on any device while reducing the attack surface for any organization with remote & hybrid workers.
Secure Cloud Tunneling bridges the gap between the competing needs of todayโs IT and security teams. IT teams need to move quickly to enable remote & hybrid productivity in a rapidly changing workplace, but security teams need to be more methodical to ensure heightened security for a remote & hybrid workforce that is increasingly under attack. Secure Cloud Tunneling provides the best of both worlds, giving IT teams the ability to be nimble without requiring security teams to make any compromises for remote technologies.
Recommendedย ITechย News: ย Cloudian Object Storage Interoperates with VMware Tanzu Greenplum Data Warehouse Platform
In addition to today’s product news, Cameyo announced it has achieved ISO 27001 Certification, the world’s most prestigious Information Security Management System (ISMS) certification, demonstrating the company’s commitment to the highest level of data privacy, compliance, and security.
โRemote and hybrid work has led to a surge in ransomware that aims to take advantage of vulnerabilities in todayโs remote access technologies,โ said Mark Bowker, Senior Analyst at Enterprise Strategy Group (ESG). โItโs no longer enough just to enable remote access – organizations must now enable secure remote productivity. But many legacy systems require organizations to open ports in their firewall or VPN, increasing the attack surface. Cameyo is committed to delivering Zero Trust security at its core, and Secure Cloud Tunneling is another valuable innovation that further protects Cameyo customers from todayโs biggest threats.โ
โWe rely on Cameyo to provide an ultra-simple and productive remote & hybrid work experience for our people, and Cameyoโs deep security capabilities were an important reason why we selected the platform to begin with,โ said Emir Saffar, CIO at Ur&Penn. โCameyoโs new Secure Cloud Tunneling technology illustrates Cameyoโs continued commitment to new innovations that will provide our employees with even more secure access to their applications from anywhere and on any device. The fact that Cameyo eliminates the need for VPNs is very attractive.”
Recommendedย ITechย News: ย Iterate.ai Now Tracking, Analyzing, and Grading 10 Million Technologies to Sharpen and Accelerate Customer Innovation
Combatting the Surge in Ransomware
Security firm Kaspersky reports that from 2019 to 2020 there was a 767% increase in ransomware, while Check Point 2021 Cyber Attack Trends mid-year report shows another 93% increase from those elevated numbers in the first six months of 2021. And research from Palo Alto Networks shows that Remote Desktop Protocol (RDP) has been the primary attack vector in 50% of all ransomware attacks since 2018.
The issue is that legacy remote access technologies like RDP were born in an era of implicit trust – users are either all the way in, or all the way out. These technologies require organizations to either open up ports in their firewall to give people access or to put everything behind a VPN, with both scenarios introducing significant security risks. Cameyoโs Cloud Tunneling uniquely solves these issues by enabling organizations to securely deliver apps outside the corporate network without opening ports in the firewall and eliminating the need for VPNs.
Native Zero Trust
โFor a solution to provide true Zero Trust security, Zero Trust must be foundational and systemic,โ said Eyal Dotan, Founder and CTO of Cameyo. โCameyo was designed from day one as a native Zero Trust system where all security capabilities are baked into the core of the platform, never treated as an additional or optional layer.โ
Recommendedย ITechย News: ย Yugabyte Delivers Industry-First Smart Client Driver for Distributed SQL Database with YugabyteDB 2.9 Release
In addition to Secure Cloud Tunneling,ย Cameyoโs single Zero Trust security architectureย includes:
- Device Access Control – Cameyo never trusts any device (even managed devices) because those devices can be compromised. Cameyo gives users secure access to the apps they need to be productive while providing complete isolation between devices and their organizationโs network/data.
- Segmentation – Even once users are in a session, Cameyo segments that session from customersโ networks and data to ensure ongoing separation.
- Prevention of Lateral Movement – Even in the case where a device has ransomware or malware, that malware cannot reach the customer organizationโs network/data, nor can malware on their systems reach the Cameyo system.
- Always-On Monitoring & Validation – Cameyo utilizes non-persistent servers, so all customer user data is wiped from the Cameyo server every time the user logs out.
- Least Privilege – With Cameyo all traffic is encrypted and apps are delivered from a secure HTML5 browser, separating the user’s device from the corporate network and eliminating the need for VPNs. Cameyo also utilizes Windows Terminal Services and temporary user profiles, ensuring users are unable to access admin privileges, settings, and files.
- Identity & Access Management – Cameyo integrates with the customerโs Single Sign-On (SSO) provider of choice, and the Multi-Factor Authentication (MFA) they have set up with their SSO applies to Cameyo.
ISO 27001 Certification
In addition to Cameyoโs continued commitment to delivering the most secure access to applications from any device, the companyโs ISO 27001 certification also highlights the companyโs commitment to information security. This certification was achieved after an extensive third-party audit and evaluation of Cameyo’s systems, processes, and platform confirmed that Cameyo meets the highest standards when it comes to establishing, implementing, maintaining, and improving its information security at all levels. Maintaining ISO 27001 certification requires an ongoing audit cycle that will ensure Cameyo’s ISMS continues to meet the highest standards.
Recommendedย ITechย News: ย SNP Expands Portfolio with New SAP S/4HANA Migration Solution for IBM Cloud

