Dealing with remote access risks
Mobile users in remote working places, travelling or simply working from home, demand and require remote access to the company’s internal network that typically contains sensitive information. The primary threat against using Remote Employee Access is malware on the (managed and unmanaged) client side. Promon SHIELD™ secures corporate data from a range of attack vectors such as;
- Code injection
- Hijacking of the browser, SSL/VPN portals, and applications used for virtual desktop sessions
Secure remote access
Promon SHIELD™ prevents all the threat scenarios as mentioned above, most importantly by creating a secure dedicated execution environment for the application. This environment is controlled and protected in-depth by strong proactive security mechanisms. This is done by:
- An SDK which is directly integrated in the application (browser or a dedicated remote desktop solution)
X-platform & self protecting (RASP)
Promon SHIELD™ offers protection to cloud- based applications and applications such as: Citrix and VMware running on PCs as well as the main mobile platforms iOS and Android. With Promon SHIELD™ the app is self-protecting and protection is restricted to the application only. With Promon SHIELD™ the attack is blocked by the application itself and the application continues to operate securely.
- Secure data at rest
- Blocks both known and unknown threats
- Detect and defend against the evolving threats
- Respond immediately to attacks to prevent data breaches
Learn how to securely access applications with sensitive enterprise data remotely
Understand how to prevent the different threat scenarios by creating a secure dedicated execution environment for your applications.