Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Cohesive Networks, formerly CohesiveFT, recently re-named to emphasize the company's focus on network security, has expanded their VNS3 product into a family of products that help enterprises secure and connect applications in public, private, and hybrid clouds. 


"With recent high profile, broad-reaching and sophisticated penetrations of firms such as JP Morgan Chase and Sony, it's increasingly obvious that simple perimeter level network defenses are insufficient," said Stephen O'Grady, Principal Analyst with RedMonk. "Combined with the fact that every portion of technical infrastructure is a target, application level security with encrypted segmentation is a must have."


Protection and performance:

VNS3:turret combines the company's connectivity technology with dataflow and compliance tools to create secure, redundant networks for each data center application. Because VNS3:turret encrypts and manages network traffic while also using adaptive compression, customers can avoid any serious network performance penalties.


"A secure micro-perimeter around each application builds 'defense in depth' with additional layers of security at the application edge," said Cohesive Networks Director of Marketing and Products, Ryan Koop. "Now, our customers can protect against both external exploits and unauthorized east-west access between
applications. VNS3:turret guards your network by routing traffic through encrypted switches."


VNS3:turret allows customers to:

 

Create a cryptographically unique micro-perimeter around each application.

Segregate applications to eliminate east-west vulnerability and monitor interior traffic.

Isolate and monitor all traffic to flow through the secure edge.

Automate compliance reporting with dataflow and monitoring tool integration.

Provide the most comprehensive application security model available today. 

Kocho selects Zadara to enhance its cloud infrastructure, aiming to address market demands and...
Westcon-Comstor has signed a distribution agreement with Meter to make its networking-as-a-service...
Netskope introduces 'Netskope One Data Lineage', enhancing data tracking and compliance in the AI...
Datadog introduces Feature Flags, enhancing feature management by integrating it with observability...
Snowflake partners with OpenAI in a $200M collaboration, integrating AI models for enhanced data...
SUSE introduces a framework to evaluate digital sovereignty gaps as per the 2025 EU guidelines.
NFON AG strengthens its position in AI communications with a new modular licence model and partner...
Hack The Box and LinkedIn Learning have joined forces, aiming to address the cybersecurity skills...