Although the concept of Zero Trust Architecture was introduced several years ago by John Kindervag, VP for Forrester Research, based on the principal of “Never Trust, Always Verify”, it has only recently been gaining popularity in wake of growing cyber-attacks. The National Institute of Standards and Technologies (NIST) defines cyber-security standards, one of which is SP 800-207 “Zero Trust Architecture“.
Used by the NIST National Cybersecurity Center of Excellence (NCCoE) SP 1800-25 and SP 1800-11 for “Data Integrity and Protection from Ransomware and other Destructive Events”. GreenTec is participating in other NIST NCCoE projects including SP 1800-10 for “Protecting Information and System Integrity in Industrial Control System Environments”.
The Zero Trust objective is to put controls in place as close to the Protect Surface as possible, creating a microperimeter to protect it.
Zero Trust Storage™ enforces a microperimiter that automatically defends critical data files and repositories with proven and simple to use defensive controls. Available for the enterprise, in the Cloud, as a private or public Web Service, or provisioned by SAN/NAS on-prem appliances, individual disk devices, USB thumb drives, and microSD devices.
Zero Trust Storage™ simplifies secure remote teleworking for small, medium and large enterprises, maintaining security, trust and confidence in your data with legacy or Cloud apps in AWS, Azure, Google or other service providers with no hidden download fees. A key advantage is that all of the storage devices are customer-owned and controlled with access from any device or app. Remote monitoring and alerting controls and identifies data access, capacity, protection status, retention periods and audit logs.
With conventional storage, encryption only protects from data disclosure. Just because data is encrypted it can still be deleted, re-formatted or re-encrypted by Ransomware causing major data loss.
Whereas, GreenTec’s Zero Trust Storage™ (ZTS) protects from disclosure and also from deletion, modification, or Ransomware with automatic self protecting patented data technologies, and are the secure storage used by the NIST NCCoE for Data Integrity Ransomware Protection.
Although the concept of Zero Trust Architecture was introduced several years ago by John Kindervag, VP for Forrester Research, based on the principal of “Never...
Law Enforcement video plays a critical role in protecting both the officers and the public. Body-worn and vehicle-based police cameras record interactions and confrontations between...
Secure Private Customer owned and controlled Zero Trust Storage secures data for on-prem or hosted systems, and in private or hybrid AWS, Azure, Google and other cloud providers. Eliminates expensive data download costs. Implements simple browser-based web access with encryption/decryption protection from any device anywhere for financial transactions, video, digital evidence, permanent records, industrial control systems, voting machines and other secure data. Solves chain-of-custody issues. Provides the ability to deliver ORIGINAL DIGITAL DATA when needed for records retention or digital evidence in court.