CIO Influence
CIO Influence News Networking Security

BlastWave Launches Passwordless Software-Defined Perimeter Solution to Address Three Most Common Attack Vectors

BlastWave Launches Passwordless Software-Defined Perimeter Solution to Address Three Most Common Attack Vectors
BlastShield, a secure remote access solution, hides infrastructure from outsiders while enabling passwordless access for authorized users

BlastWave, a developer of software-defined perimeter (SDP) solutions that protect networks from inadvertent and intentional threats, announces BlastShield, the first all-in-one SDP solution that combines infrastructure cloaking and passwordless multi-factor authentication (MFA) for identity-based secure remote network access for organizations who’ve adopted a zero trust security model. BlastShield enables organizations to hide on-premise and cloud workloads from outsiders and insider threats, concealing an organization’s infrastructure from cyberattacks through software-defined microsegmentation without modifications to existing network fabric and hardware. Using passwordless MFA, BlastShield prevents account takeovers while combining the SDP capabilities of asset cloaking to hide an organization’s infrastructure from cyberattacks.

With today’s businesses being exposed to a newly expanded attack surface created by hybrid work, a cultural shift in coordinated cyberattacks is taking place. “Data is everywhere. We’ve seen attacks become ubiquitous across critical infrastructure — from energy, utilities, food supply and healthcare. In the past year, nine out of ten data breaches are the result of accidental threats caused from weak passwords, phishing, and lack of patch and vulnerability management,” said Alissa Knight, cybersecurity influencer and ethical hacker, Knight Ink.PREDICTIONS SERIES 2022

Top iTechnology AIOps News: VIDA Streamlines Respiratory Clinical Trials with Artificial Intelligence (AI)

Knight adds, “BlastWave offers a unified stack that combines passwordless MFA, secure remote access, and microsegmentation in a single solution that enables zero trust applications and network access. You can’t hack what you can’t see. What I appreciate about the value BlastShield brings, is its focus on identity-based authentication and authorization that helps prevent even accidental threats, but also secures partner connections from the recent wave of breaches we’ve seen in the supply chain.”

BlastShield Secures Against Multiple Steps in the Cyber Kill Chain

BlastShield solves the three most critical steps in the cyber kill chain for an attacker: (1) account takeover; (2) lateral movement; and (3) remote access compromise. By disrupting the adversarial decision-making process, the mean time to detection (MTTD) and mean time to response (MTTR) can be greatly reduced, lowering the cost of a breach and potential for data compromise.

Companies are attempting to thwart these attacks using multiple-point solutions that offer a specific security control for a specific threat and create more complexity and cost for Chief Information Security Officers (CISOs). BlastShield utilizes a three-pronged approach to help CISOs prevent cyber-attacks in many cases and reduce the “blast radius” of breaches in others. The software-defined solution provides an all-in-one-zero trust stack that eliminates VPN costs and resource requirements (secure remote access), eliminates passwords to prevent account takeover (ATO) attacks (passwordless MFA), and implements software-defined microsegmentation (SDP) to fragment a company’s flat network into secure enclaves preventing lateral movement in the event of a compromise.

Top iTechnology Cloud News: DEMICON is amongst the best IT service providers in Germany

The patented peer-to-peer solution deploys in minutes for a frictionless integration for IT and requires virtually no configuration or change to the network fabric or hardware. Once deployed, BlastShield provides real-time segmentation and access control management across the network.

“We took the time to speak with our partners and customers, asking CISOs and CTOs about security attacks and threats they were experiencing and why current solutions were not working,” said Tom Sego, Co-Founder and CEO, BlastWave. “Networks are becoming more complicated and diverse. Homes are becoming part of the corporate network, and more devices are getting IP addresses. Cybercriminals love this complexity as they can leverage a wider array of attack vectors. Traditional remote management solutions haven’t kept up with this evolution, which explains the explosion in ransomware and cyber-attacks over the past few years and exodus away from legacy VPNs and flat networks.”

Sego added, “With BlastShield, we apply both a zero trust framework and simplicity for users and administrators to eliminate and reduce human error and the most common threats. As an example, our authentication process is similar to Apple Pay. It’s quick, easy and extremely secure for users without the hassle and risk of dealing with passwords.”

Top iTechnology Analytics News: Logz.io Unveils Enhancements to Observability Platform at ScaleUP 2021

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Twilio Veteran Jessica Popp Joins Ada As Chief Technology Officer

CIO Influence News Desk

Transposit Unveils New AWS, GCP and Azure Actions, Enabling CloudOps to Make Change Safe Through Self-Service Workflows

CIO Influence News Desk

Vouched Achieves SOC 2 Type II Compliance Certification

PR Newswire

Leave a Comment