Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

DH2i Launches DxConnect Network Security Software for Integrated Zero Trust Connectivity

Enables Developers and Network Admins to Support What Work Looks like Today – IoT, Edge Computing, Cloud and Multi-Cloud Without the Need for a VPN

DH2i, the leading provider of multi-platform Software Defined Perimeter and Smart Availability software, announced the general availability launch of DxConnect network security software for integrated Zero Trust (ZT) connectivity.  DxConnect enables developers and network administrators to build an integrated ZT connectivity security infrastructure for cloud native applications, hybrid/multi-cloud connectivity and privileged user access without using a VPN.

The recently published 2019 Verizon Data Breach Investigations Report (DBIR) analyzed 41,686 security incidents, of which 2,013 were confirmed data breaches, and found that the majority of data breaches occurred due to technical deficiencies present in computer networks.  The report further pointed out that once cybercriminals are inside a network, their process is almost always the same: establish continued access, escalate or obtain administrator privileges, move quietly to map the entire network, look for open ports, locate the “crown jewels” and exfiltrate the data undetected for as long as possible.  The report also stated that just one data breach could cost anywhere from tens of thousands of dollars to as much as $100 million.  The recent 2018 Cost of a Data Breach Study: Global Overview by Ponemon likewise reported that the average cost of a data breach was up 6.4 percent to $3.86 million.

Read More: Twenty Interesting AI Symbiotic Events To Look Forward To In 2019

The technical deficiencies, or vulnerabilities, existing in today’s computer networks are being exacerbated by the explosion of the Internet of Things (IoT) and edge computing.  IoT is made up of billions of smart devices that use IP networks to talk to each other (and to us).  The IoT world is growing to a projected 28.5 billion devices by 2022.  M2M (machine-to-machine) will be more than half of the global connected devices and connections by 2022.  The need for secure privileged user access is growing faster (7 percent CAGR) than the world’s population (1 percent CAGR).  Secure cloud-native microservice connections will be the fastest growing IP connection type by 2022.*

Legacy connectivity and security approaches such as virtual private networks (VPNs) were not designed or intended for today’s data reality. This has led to issues such as complex setup and management, slow and unreliable connections, limited scalability, highly compromised and vulnerable networks and data and large, escalating costs.  DH2i’s DxConnect was designed to work with DH2i’s DxOdyssey software to tackle legacy VPN, cloud-native and privileged user access security issues.  DxConnect improves network security, was designed specifically for hybrid/multi-cloud operations, meets the scaling requirements of DevOps, IoT, containers and edge workloads, delivers faster performance, and it has an open API for integrations, analytics, visibility and compliance. A key problem it solves is it enables developers to build encrypted micro-tunnels that span isolated networks to connect containers for a secure multi-cloud service mesh. It also enables organizations to securely connect vendors to a specific cloud application without using a VPN.

Read More: Lockheed Martin and Drone Racing League Announce 2019 AlphaPilot Teams

“The major changes being driven by advancements such as IoT, edge computing, mobile, and cloud are creating conflicting demands for secure connectivity. The traditional ‘Castle & Moat VPN drawbridge’ security model was not designed to meet those demands,” said Eric Hanselman, Chief Analyst at 451 Research.  “And, while a wholesale rip-and-replace is certainly not recommended, enhancing legacy technology (e.g., VPNs) with an advanced Software-Defined Perimeter approach like that of DH2i’s DxConnect, would be a smart strategy to fortify and unify your organization’s connectivity security.”

“For decades, VPNs have been considered the go-to for network connectivity security.  However, VPN technology is no longer able to fully protect today’s networks.  In fact, it typically not only exposes sensitive data to increased security risk, but oftentimes multiplies those risks exponentially,” said Don Boxley, CEO and Co-Founder, DH2i.  “DH2i’s new DxConnect was designed with an innovative yet flexible architecture to navigate today’s connectivity security challenges such as connecting microservices that are running on isolated networks.  DH2i’s DxConnect supports what work looks like today and tomorrow.”

Read More: Taiwanese Startups Receive 4.5 Million Euros from Swiss & French Smart Health Industry at ICT Spring of Luxembourg

DxConnect Features and Benefits

–        Micro-Perimeters – Application-level micro-tunnels give network admins and developers the ability to create micro-perimeters to segment by application, not by network.

o   Eliminates lateral network attacks

o   Unifies HTTP, SSH and inter-microservice connectivity

o   Users/services/devices get fast, direct access to applications and services

–        Discreet Invisibility – Randomly generated non-standard UDP ports for dynamic on-demand micro-tunnel communications.

Related Posts
1 of 40,574

o   Virtually eliminates network attack surfaces

o   Users/services/devices are cloaked and secured with no open ports

o   Applications and services are invisible to “bad actors”

–        Multi-Cloud Ready – Designed to enable secure “from any host, to any host, anywhere” application data communications with application-level DTLS encrypted micro tunnels and Public Key Authentication.

o   Scales across hybrid/multi-cloud environments

o   Leverages native cloud platform capabilities

o   Consistent policies and auditing across hybrid/multi-cloud

o   No cloud vendor lock-in

–        Smart Availability – Dynamic movement of micro-tunnel gateways and application workloads with automatic self-healing fault detection and failover.

o   Automates and orchestrates micro-tunnel and workload creation and location

o   Enables an “always-secure and always-on” application infrastructure

–        Open API – Lightweight software with open API that runs on any Linux or Windows host.

o   Enables secure interconnection to be built into a DevOps toolchain

o   Supports Kubernetes, Docker, Chef, Puppet and more for scaling cloud-native apps

o   Hardens existing network security infrastructure (e.g. MFA, SIEM, EMM, SSO) and paths to data and services

Read More: IBM AI and Cloud Technology Helps Agriculture Industry Improve the World’s Food and Crop Supply

31 Comments
  1. darmowe gry ben ten says

    Thank you a bunch for sharing this with all people you actually realize what you’re
    talking about! Bookmarked. Please additionally
    seek advice from my site =). We may have a hyperlink change contract among us

    Look into my site darmowe gry ben ten

  2. Geef de fortunei in de zomers veel water. Wegens de warmte kan hij
    overvloedig vocht opnemen van de grond, dus doorweekt is een uitstekende portie water.

    Feel free to visit my page – http://9.Motion-Design.org.ua

  3. Highly energetic post, I liked that a lot. Will there be a part 2?

  4. tlover tonet says

    Utterly written content, thanks for entropy.

  5. دیجی صنعت says

    hello!,I really like your writing very so much! percentage we be in contact extra approximately your post on AOL? I require an expert in this area to solve my problem. May be that is you! Looking forward to see you.

  6. Copper scrap pickup Copper powder recycling Metal reclaiming center services
    Scrap Copper cable value, Responsible metal reclamation, Copper dross recycling

  7. Iron resource recovery says

    Metal recycling processing Ferrous material CSR (Corporate Social Responsibility) Iron and steel scrapping services

    Ferrous scrap dealers, Iron reclamation solutions, Metal waste residue

  8. hire a hacker dark web says

    There is noticeably a bundle to know about this. I assume you made certain good factors in options also.

  9. Home Security Systems says

    Great post, you have pointed out some wonderful points, I likewise believe this s a very wonderful website.

  10. sat5210-7000g says

    I believe you have noted some very interesting details , regards for the post.

  11. Boostaro reviews says

    I am not rattling great with English but I get hold this rattling easy to translate.

  12. sugar defender reviews says

    Some genuinely interesting details you have written.Aided me a lot, just what I was looking for : D.

  13. Tonic Greens says

    This blog is definitely rather handy since I’m at the moment creating an internet floral website – although I am only starting out therefore it’s really fairly small, nothing like this site. Can link to a few of the posts here as they are quite. Thanks much. Zoey Olsen

  14. SightCare says

    The next time I read a weblog, I hope that it doesnt disappoint me as a lot as this one. I mean, I do know it was my option to read, but I actually thought youd have something interesting to say. All I hear is a bunch of whining about one thing that you may fix when you werent too busy on the lookout for attention.

  15. itc bet says

    F*ckin’ awesome things here. I’m very glad to see your article. Thanks a lot and i am looking forward to contact you. Will you kindly drop me a mail?

  16. Lottery defeater system says

    Normally I do not read article on blogs, but I would like to say that this write-up very forced me to try and do so! Your writing style has been amazed me. Thanks, quite nice post.

  17. cell phone hackers for hire says

    I have not checked in here for some time because I thought it was getting boring, but the last several posts are great quality so I guess I’ll add you back to my everyday bloglist. You deserve it my friend 🙂

  18. I like this post, enjoyed this one appreciate it for putting up.

  19. Fitspresso review says

    Hello. fantastic job. I did not anticipate this. This is a splendid story. Thanks!

  20. bookkeeping near me says

    You should take part in a contest for one of the best blogs on the web. I will recommend this site!

  21. sight care says

    I just like the helpful info you supply to your articles. I’ll bookmark your weblog and take a look at again right here frequently. I’m moderately sure I’ll be informed a lot of new stuff proper here! Best of luck for the following!

  22. nfl live stream says

    good post.Ne’er knew this, thanks for letting me know.

  23. Nitric Boost Ultra says

    Perfect piece of work you have done, this internet site is really cool with fantastic info .

  24. MMA Stream says

    I appreciate your piece of work, thanks for all the good blog posts.

  25. crackstream says

    Would love to forever get updated great website! .

  26. reddit soccer streams says

    It is actually a nice and helpful piece of info. I’m glad that you just shared this useful info with us. Please stay us informed like this. Thanks for sharing.

  27. I likewise believe thus, perfectly pent post! .

  28. watch MLB games live says

    Excellent site. A lot of useful information here. I’m sending it to some friends ans also sharing in delicious. And obviously, thanks for your effort!

  29. crackstreams nba says

    Hi! Do you know if they make any plugins to protect against hackers? I’m kinda paranoid about losing everything I’ve worked hard on. Any tips?

  30. NFLStream Online says

    Howdy! Do you use Twitter? I’d like to follow you if that would be ok. I’m absolutely enjoying your blog and look forward to new posts.

  31. deepfakes says

    Perfectly composed written content, regards for selective information.

Leave A Reply

Your email address will not be published.