Logo

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

  • Wednesday, 21st January 2015 Posted 11 years ago in by Phil Alsop

Cohesive Networks, formerly CohesiveFT, recently re-named to emphasize the company's focus on network security, has expanded their VNS3 product into a family of products that help enterprises secure and connect applications in public, private, and hybrid clouds. 


"With recent high profile, broad-reaching and sophisticated penetrations of firms such as JP Morgan Chase and Sony, it's increasingly obvious that simple perimeter level network defenses are insufficient," said Stephen O'Grady, Principal Analyst with RedMonk. "Combined with the fact that every portion of technical infrastructure is a target, application level security with encrypted segmentation is a must have."


Protection and performance:

VNS3:turret combines the company's connectivity technology with dataflow and compliance tools to create secure, redundant networks for each data center application. Because VNS3:turret encrypts and manages network traffic while also using adaptive compression, customers can avoid any serious network performance penalties.


"A secure micro-perimeter around each application builds 'defense in depth' with additional layers of security at the application edge," said Cohesive Networks Director of Marketing and Products, Ryan Koop. "Now, our customers can protect against both external exploits and unauthorized east-west access between
applications. VNS3:turret guards your network by routing traffic through encrypted switches."


VNS3:turret allows customers to:

 

Create a cryptographically unique micro-perimeter around each application.

Segregate applications to eliminate east-west vulnerability and monitor interior traffic.

Isolate and monitor all traffic to flow through the secure edge.

Automate compliance reporting with dataflow and monitoring tool integration.

Provide the most comprehensive application security model available today. 

ShareGate research highlights the challenges organisations face as AI adoption outpaces existing...
Mountain Warehouse replaces its legacy ecommerce platform with a composable solution built on...
ABB has announced the winners of its 2026 Startup Challenge, which focuses on AI-based solutions...
SolarWinds has introduced SW1, an AI-driven system designed to support more autonomous IT...
Oracle is expanding its multicloud networking capabilities with a new connectivity offering between...
Smartsheet research highlights a gap in UK businesses between AI-driven productivity gains and...
SnapLogic has introduced platform enhancements designed to connect AI with enterprise workflows,...
11:11 Systems has been celebrated for its partnership with Cohesity, focusing on cyber resilience,...