• NEWS
  • INTERVIEWS
    • AiThority Text Interviews
    • Podcast – AI Inspired Stories
  • INSIGHTS
    • GUEST AUTHORS
    • AIT STAFF WRITER
  • AI RADAR
    • A
      • Analytics
      • Automation
      • Apps
      • AIT Featured Posts
      • Augmented Reality
      • AIT MegaMind
      • Autonomous Vehicles
      • AI Machine Learning Projects
      • AiThority.com Primers
      • Assistive Technologies
      • Arguments Against AI
    • B
      • Blockchain
      • Big Data
      • Business Intelligence
      • Bots/Intelligent Assistants
    • C
      • Cloud
      • Computing
      • Cryptocurrency
      • Customer Experience
      • Chatbots & Intelligent Assistants
      • ChatGPT
      • Computer Vision
      • Challenges
      • customer Experience
      • Content
      • Cognitive
      • Creativity & Intelligence
      • Computer Vision
    • D
      • Data Management
      • Data Center and Co-location
      • Deep Learning
      • Drones
      • Diagnosis
    • E
      • Education and Research
      • Energy management
      • Edge Computing
      • End-point Security
    • F
      • Financial Services
      • Face Recognition
    • G
      • Guest Authors
      • Gaming
      • Gadgets
      • generative AI
      • GovTech
    • H
      • Healthcare Management
      • HR Technology
      • Hot Startups
    • I
      • IoT
      • IT and DevOps
      • Investment
      • Interviews
      • Image Understanding
      • Information Extraction
      • Information Fusion
      • Inductive Learning
      • Intel
      • Issues
    • L
      • Life Sciences
      • Locomotion
    • M
      • Machine Learning
      • Martech
      • Mobile
      • Mobility
      • Manufacturing
      • Medical Apps
      • Mobility
      • Mining
      • Machine Translation
      • Memory-Based Learning
    • N
      • News
      • Native and Programmatic Advertising
      • Natural Language
      • NFT
      • Neural Networks
      • Neuroscience
    • O
      • Optimization
      • Optical Character Recognition
    • P
      • Predictive
      • Programming Languages
    • Q
      • Quantum Computing
    • R
      • Robots
      • Regulation and Compliance Managment
      • Robots / Drones
    • S
      • Security
      • SaaS
      • Sales and Customer Support
      • Space Technology
      • Storage and Recovery
      • Smart Home
      • Speech Recognition
      • Social Issues
    • T
      • Technology
      • The Future
      • Talent-acquisition
    • U
      • Urban Mobility
    • V
      • Video
      • Virtual Reality
      • Voice
      • Vision
      • Video Understanding
    • W
      • web3
      • Wearables
    • AI in MARKETING
    • AI in SALES
    • AI in HR
    • AI in Finance
    • AiThority.com Primers
  • SERVICES
    • Editorial
    • Lead Generation
    • Events
  • Subscribe
  • CONTACT US
  • NEWS
  • INTERVIEWS
    • AiThority Text Interviews
    • Podcast – AI Inspired Stories
  • INSIGHTS
    • GUEST AUTHORS
    • AIT STAFF WRITER
  • AI RADAR
    • A
      • Analytics
      • Automation
      • Apps
      • AIT Featured Posts
      • Augmented Reality
      • AIT MegaMind
      • Autonomous Vehicles
      • AI Machine Learning Projects
      • AiThority.com Primers
      • Assistive Technologies
      • Arguments Against AI
    • B
      • Blockchain
      • Big Data
      • Business Intelligence
      • Bots/Intelligent Assistants
    • C
      • Cloud
      • Computing
      • Cryptocurrency
      • Customer Experience
      • Chatbots & Intelligent Assistants
      • ChatGPT
      • Computer Vision
      • Challenges
      • customer Experience
      • Content
      • Cognitive
      • Creativity & Intelligence
      • Computer Vision
    • D
      • Data Management
      • Data Center and Co-location
      • Deep Learning
      • Drones
      • Diagnosis
    • E
      • Education and Research
      • Energy management
      • Edge Computing
      • End-point Security
    • F
      • Financial Services
      • Face Recognition
    • G
      • Guest Authors
      • Gaming
      • Gadgets
      • generative AI
      • GovTech
    • H
      • Healthcare Management
      • HR Technology
      • Hot Startups
    • I
      • IoT
      • IT and DevOps
      • Investment
      • Interviews
      • Image Understanding
      • Information Extraction
      • Information Fusion
      • Inductive Learning
      • Intel
      • Issues
    • L
      • Life Sciences
      • Locomotion
    • M
      • Machine Learning
      • Martech
      • Mobile
      • Mobility
      • Manufacturing
      • Medical Apps
      • Mobility
      • Mining
      • Machine Translation
      • Memory-Based Learning
    • N
      • News
      • Native and Programmatic Advertising
      • Natural Language
      • NFT
      • Neural Networks
      • Neuroscience
    • O
      • Optimization
      • Optical Character Recognition
    • P
      • Predictive
      • Programming Languages
    • Q
      • Quantum Computing
    • R
      • Robots
      • Regulation and Compliance Managment
      • Robots / Drones
    • S
      • Security
      • SaaS
      • Sales and Customer Support
      • Space Technology
      • Storage and Recovery
      • Smart Home
      • Speech Recognition
      • Social Issues
    • T
      • Technology
      • The Future
      • Talent-acquisition
    • U
      • Urban Mobility
    • V
      • Video
      • Virtual Reality
      • Voice
      • Vision
      • Video Understanding
    • W
      • web3
      • Wearables
    • AI in MARKETING
    • AI in SALES
    • AI in HR
    • AI in Finance
    • AiThority.com Primers
  • SERVICES
    • Editorial
    • Lead Generation
    • Events
  • Subscribe
  • CONTACT US
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cameyo Introduces Secure Cloud Tunneling to Further Reduce the Attack Surface for Remote & Hybrid Work Without VPNs

SecurityCloudNews
By AIT News Desk On Aug 25, 2021
Share

Cameyo Extends Its Commitment to Zero Trust Security with New Capabilities & Achieves ISO 27001 Certification

Cameyo, the company that provides simple and secure Virtual Application Delivery (VAD) for any Digital Workspace, announced Secure Cloud Tunneling, a new technology that provides greater protection for organizations enabling remote & hybrid work by eliminating the need to open ports in their firewall – a practice that can increase exposure to hackers and ransomware. Cameyo’s Secure Cloud Tunneling expands upon its native Zero Trust security architecture and continues Cameyo’s tradition of providing the most secure access to business-critical applications on any device while reducing the attack surface for any organization with remote & hybrid workers.

Recommended AI News: Boba Network And DODO Partner To Offer Enhanced Liquidity And Issuance Capabilities

Secure Cloud Tunneling bridges the gap between the competing needs of IT and security teams. IT teams need to move quickly to enable remote & hybrid productivity in a rapidly changing workplace, but security teams need to be more methodical to ensure heightened security for a remote & hybrid workforce that is increasingly under attack. Secure Cloud Tunneling provides the best of both worlds, giving IT teams the ability to be nimble without requiring security teams to make any compromises for remote technologies.

In addition to product news, Cameyo announced it has achieved ISO 27001 Certification, the world’s most prestigious Information Security Management System (ISMS) certification, demonstrating the company’s commitment to the highest level of data privacy, compliance, and security.

“Remote and hybrid work has led to a surge in ransomware that aims to take advantage of vulnerabilities in remote access technologies,” said Mark Bowker, Senior Analyst at Enterprise Strategy Group (ESG). “It’s no longer enough just to enable remote access – organizations must now enable secure remote productivity. But many legacy systems require organizations to open ports in their firewall or VPN, increasing the attack surface. Cameyo is committed to delivering Zero Trust security at its core, and Secure Cloud Tunneling is another valuable innovation that further protects Cameyo customers from biggest threats.”

“We rely on Cameyo to provide an ultra-simple and productive remote & hybrid work experience for our people, and Cameyo’s deep security capabilities were an important reason why we selected the platform to begin with,” said Emir Saffar, CIO at Ur&Penn. “Cameyo’s new Secure Cloud Tunneling technology illustrates Cameyo’s continued commitment to new innovations that will provide our employees with even more secure access to their applications from anywhere and on any device. The fact that Cameyo eliminates the need for VPNs is very attractive.”

Recommended AI News: Simplr Launches Capabilities to Power Customer Empathy at Scale

Combatting the Surge in Ransomware

Security firm Kaspersky reports that from 2019 to 2020 there was a 767% increase in ransomware, while Check Point 2021 Cyber Attack Trends mid-year report shows another 93% increase from those elevated numbers in the first six months of 2021. And research from Palo Alto Networks shows that Remote Desktop Protocol (RDP) has been the primary attack vector in 50% of all ransomware attacks since 2018.

The issue is that legacy remote access technologies like RDP were born in an era of implicit trust – users are either all the way in, or all the way out. These technologies require organizations to either open up ports in their firewall to give people access or to put everything behind a VPN, with both scenarios introducing significant security risks. Cameyo’s Cloud Tunneling uniquely solves these issues by enabling organizations to securely deliver apps outside the corporate network without opening ports in the firewall and eliminating the need for VPNs.

Native Zero Trust

“For a solution to provide true Zero Trust security, Zero Trust must be foundational and systemic,” said Eyal Dotan, Founder and CTO of Cameyo. “Cameyo was designed from day one as a native Zero Trust system where all security capabilities are baked into the core of the platform, never treated as an additional or optional layer.”

Recommended AI News: Daily AI ML Roundup: Latest Artificial Intelligence News

In addition to Secure Cloud Tunneling, Cameyo’s single Zero Trust security architecture includes:

  • Device Access Control – Cameyo never trusts any device (even managed devices) because those devices can be compromised. Cameyo gives users secure access to the apps they need to be productive while providing complete isolation between devices and their organization’s network/data.
  • Segmentation – Even once users are in a session, Cameyo segments that session from customers’ networks and data to ensure ongoing separation.
  • Prevention of Lateral Movement – Even in the case where a device has ransomware or malware, that malware cannot reach the customer organization’s network/data, nor can malware on their systems reach the Cameyo system.
  • Always-On Monitoring & Validation – Cameyo utilizes non-persistent servers, so all customer user data is wiped from the Cameyo server every time the user logs out.
  • Least Privilege – With Cameyo all traffic is encrypted and apps are delivered from a secure HTML5 browser, separating the user’s device from the corporate network and eliminating the need for VPNs. Cameyo also utilizes Windows Terminal Services and temporary user profiles, ensuring users are unable to access admin privileges, settings, and files.
  • Identity & Access Management – Cameyo integrates with the customer’s Single Sign-On (SSO) provider of choice, and the Multi-Factor Authentication (MFA) they have set up with their SSO applies to Cameyo.

ISO 27001 Certification

In addition to Cameyo’s continued commitment to delivering the most secure access to applications from any device, the company’s ISO 27001 certification also highlights the company’s commitment to information security. This certification was achieved after an extensive third-party audit and evaluation of Cameyo’s systems, processes, and platform confirmed that Cameyo meets the highest standards when it comes to establishing, implementing, maintaining, and improving its information security at all levels. Maintaining ISO 27001 certification requires an ongoing audit cycle that will ensure Cameyo’s ISMS continues to meet the highest standards.

Availability & Pricing

Cameyo’s Secure Cloud Tunneling capabilities are available for all customers. With Cameyo’s Zero Trust architecture, security is never an optional add-on. Like all of Cameyo’s security capabilities, Secure Cloud Tunneling is built into the core of the platform and is available immediately to all Cameyo customers at no additional cost.

Related Posts

The Memory Web: Building Long-Term AI Recall For Organization

Oct 23, 2025

AuditBoard Announces Acquisition of FairNow to Expand AI Governance Capabilities

Oct 23, 2025

MariaDB Unveils Unified Cloud Database Platform Designed to Accelerate Agentic AI Application Development

Oct 23, 2025
Prev Next 1 of 41,773
Recommended AI News: AKASA Announces Accelerated Growth And Expanding Customer Base
Attack SurfaceCameyodigital workspaceRemote & Hybrid WorkSecure Cloud TunnelingVirtual Application Delivery (VAD)VPNs
Share
AIT News Desk

AIT News Desk is a trained group of web journalists and reporters who collect news from all over the technology landscape. The technical space includes advanced technologies related to AI, ML, ITops, Cloud Security, Privacy and Security, Cyberthreat intelligence, Space, Big data and Analytics, Blockchain and Crypto.
To connect, please write to AiT Analyst at news@martechseries.com.

Prev Post

Mavenir Acquires Telestax to Enhance Its Business Messaging and Customer Engagement Platform with CPaaS

Next Post

Itential Appoints New Chief Financial Officer, Nicolas Alberga

You might also like More from author
AIT Featured Posts

The Memory Web: Building Long-Term AI Recall For Organization

Machine Learning

AuditBoard Announces Acquisition of FairNow to Expand AI Governance Capabilities

Cloud

MariaDB Unveils Unified Cloud Database Platform Designed to Accelerate Agentic AI…

Technology

Spinnaker Support Bridges Delaware County’s SAP Support Needs as it Migrates to…

Prev Next

Comments are closed.

Follow Us

AiThority.com covers AI technology news, editorial insights and digital marketing trends from around the globe. Updates on modern marketing tech adoption, AI interviews, tech articles and events.

Quick Links

  • NEWS
  • INTERVIEWS
  • INSIGHTS
  • EVENTS
  • CONTACT US

Visit Our Other Sites

Follow Us

Facebook X-twitter Linkedin

Interested in our Customized Editorial Services?

Please fill your details and we’ll get in touch with you!

Fill Your Details

NEWS

INTERVIEWS

INSIGHTS

AI RADAR

SERVICES

SUBSCRIBE

CONTACT US

Brought to you by

To repurpose or use any of the content or material on this and our sister sites, explicit written permission needs to be sought.

Copyright © 2025 AiThority. All Rights Reserved. Privacy Policy