Featured Article from Cloud Security

Securing the Cloud through Cell Structure Security

February 08, 2016

As the headlines scream almost daily it is obviously no surprise that cloud security has risen to the very top of enterprise IT department concerns. This in fact has become exacerbated as more and more mission critical capabilities accelerate their migration to the cloud. Indeed, investment in cloud security solutions by organizations of all sizes globally, as well as venture money pouring into startups seeking to provide innovative solutions to help enterprises mitigate cyber security challenges on all fronts, reflect just how serious the problems are along with the urgency now associated with dealing with them.

One company looking at helping companies meet the growing risks associated with the increased aggression of bad actors is The Sixth Flag, Inc.  It recently introduced an interesting solution to address a variety of security concerns. The company revealed its Cell Structure Security to secure its Workspace-as-a-Service platform.

Beyond your typical virtual desktop solution, this platform is all about centralization, security, and ubiquitous access achieved through a web browser. The Cell Structure Security system allows for the containment of threats through componentized isolation. Taking a modular approach, it reduces the threat vector surface focusing on the continual containment of the spread of infections and the isolation of systems that have been compromised. The approach scrambles the credentials of users in every session, while totally encrypting data both in transit and at rest. At the end of the each session or completion of task, the user’s workspace, minus any data, is destroyed. This approach helps harden a system, while mitigating compromise of nearly all types. 

Applied to the cloud, the approach secures data as it is in transit across infrastructures of client environments and a number of disparate clouds. The same approach also helps reliability, scale, and performance by applying granular principles in its central management construct.

Company founder and CEO Pete Kofod states that he founded the company based on his military experience, and recognized the opportunity to apply granular concepts to cloud services for a better security profile.  Kofod adds that compromise is an inevitable reality, and the industry has largely focused on a combination of hardening points of failure and integrating centralized authentication systems.  He feels that thanks to the features of his product, the cloud can be considered an asset over a liability.

The cloud cell security approach is an interesting proposition that applies sensible principles of segmentation and minimizing risk. As noted, the cloud security industry is currently booming, and alternative, specialized security technologies are receiving praise as well as opportunities alongside traditional security approaches. 




Edited by Peter Bernstein

Article comments powered by Disqus

FREE eNewsletter

Get the Latest Cloud Security News

ArrowSubscribe Now