CHANTILLY, Va.–(BUSINESS WIRE)–NetAbstraction, the security by obfuscation company, today announced NetAbstraction NetEnclave, a cloud obfuscation service that creates a veil of secrecy around applications, resources and data that makes an organization’s assets invisible to attackers. NetEnclave is based on principles used by the company’s founders to implement clandestine telecommunication networks for the intelligence community.
According to a study conducted by IDC, almost every organization using cloud infrastructure is experiencing security failures, with 98% reporting having at least one cloud data breach in the past 18 months. Since virtually all cloud storage, backup and data sharing services are easily tied back to the organization that procured them, NetAbstraction NetEnclave obfuscates both the digital communication and billing trail to cloud resources for anonymity, while ensuring zero trust access to sensitive data.
“NetEnclave provides unprecedented levels of privacy and security for both public cloud and hybrid assets using obfuscation techniques that make an organization’s resources undiscoverable to threat actors,” said Gordon Lawson, CEO of NetAbstraction. “With data at risk from account compromise, misconfiguration vulnerabilities and other threats, concealing a company’s attack surface from threat actors is the ultimate compensating control for cloud security posture management.”
NetAbstraction NetEnclave anonymizes an organization’s cloud resources including data and applications using a network privacy fabric that implements deterministic routing and is cloud provider and geography agnostic. NetEnclave’s misattribution capabilities enable organizations to shield sensitive processes from external threats, perform risky operations such as cyber security research in a secure environment and create data recovery islands for business continuity and operational stability that are isolated from attacker reconnaissance activities.
NetEnclave integrates with leading cloud data platforms including Oracle, Snowflake, Splunk and more, and provides standard authentication models allowing organizations to enforce MFA and leverage their existing identity management solutions.
NetEnclave supports several leading business use cases including:
Ransomware protection – insurance providers are using NetEnclave to harden backup processes by maintaining a safe, secure and non-attributable location for storing their most prized data. These virtual data islands reduce insurers’ attack surface and provide zero-trust access for authorized users and processes to protect data against ransomware attacks.
Secure application hosting – the cloud provides anywhere access to data but also creates a new attack surface which allows attackers to easily identify misconfigurations, take advantage of software vulnerabilities and create a profile of digital workflows and critical processes. NetEnclave allows organizations to host key applications in a secure access service edge (SASE) model that uses patented obfuscation technology to conceal them from external reconnaissance.
Malware analysis – since most organizations lack the resources to conceal their identity when performing critical cyber security operations such as malware analysis and threat hunting, NetEnclave makes it possible to execute research and store artifacts while keeping the identity of the company anonymous.
Availability and Free Trial
NetAbstraction NetEnclave is available immediately from NetAbstraction and its business partners worldwide. The company is offering qualified organizations free trial access to the NetEnclave. For more information visit https://www.netabstraction.com/request-a-demo/
NetAbstraction enables organizations to protect the privacy and security of identities and systems by intelligently selecting and obscuring global network pathways on the Internet. The company’s founders previously designed, created and implemented clandestine telecommunication networks for the NSA and CIA. NetAbstraction is used by Fortune 500 organizations globally to ensure their cyber operations remain secure, anonymous, and non-attributable. For more information visit https://netabstraction.com/, and follow us on LinkedIn and Twitter.