Getting Started Archives | Page 3 of 7 | Cloud-Based Platform AIONCLOUD

What is cybersecurity?

Cybersecurity is the combination of people, policies, processes and technologies employed by an enterprise to protect its cyber assets. Cybersecurity is optimized to levels that business leaders define, balancing the resources required with usability/manageability and the amount of risk offset.

What is ZTNA?

Zero trust network access (ZTNA) is a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities. The broker verifies the identity, context and policy adherence Read more about What is ZTNA?[…]

What is SECaaS?

Security as a Service (often abbreviated as SECaaS) is a means by which organizations ensure the highest levels of threat detection and response in the most cost-efficient manner by utilizing managed security service providers (MSSPs). Organizations taking advantage of Security as a Service see both immediate and long-term benefits. These include: Cost savings & Reduced Read more about What is SECaaS?[…]

What is AILabs?

AILabs, AIONCLOUD’s new AI-based threat intelligence, is a cloud-hosted threat-intelligence platform that delivers intelligence to attackers and real-time threat intelligence to attack technologies. Threat Intelligence of MONITORAPP, AILabs, combines technologies such as signature/flat detection, full traffic inspection, and profiling, real-time information collection/sharing, third-party interlink, data mining, and big data analytics.

What is a PKP bypass setting?

A. PKP bypass makes sure programs and servers are under communication. As AIONCLOUD SWG is using a self-signed certificate to inspect traffic, it cannot communicate with the PKP used server. While using the PKP bypass program can communicate with the server, the traffic can not be inspected.

What is PKP?

A. The PKP(Public Key Pinning) and MITM(Man in the Middle) is the security technology to prevent attacks from the internet. It mapping the public key which stores in the client’s server and the public key received by TLS handshake while connecting to the server. If the mapping failed, the connection will be blocked

Scroll Up