IntegraShield® - IntegraShield protects against unauthorized access to your personal data that can lead to significant breaches, distrust of corporate integrity, and financial loss.
Cloud Market Expansion. As the market for cloud-based solutions and interoperability between systems continues to expand, breaches from unauthorized access have continued to grow. Don’t just react to data breaches, eliminate them with IntegraShield. Whether the data is consumer payment accounts, private healthcare information, or privacy centric, IntegraShield is designed to limit and control external access.
IntegraShield’s tamper-proof design prohibits unauthorized access and enables notification of attempted modifications providing a forensic footprint for all transactions within the enterprise.
IntegraShield features:
- Validates originating client request MAC address to a Shield controlled Access Control List
- Validates originating client IP address to a Shield controlled IP white table listing
- Validates public internet address against a Shield controlled blacklist
- Validates the Shield Client boxes are not tampered or altered
- Validates security token to eliminate Man-in-the-Middle (MITM) attacks
- Each Shield Client has a security profile that aids us to prevent fraudulent activity as well as creating predictability results
- Utilizes 256-bit SSL/TLSv1.2 encryption with an M2 generated public/private certificate
- Provides a complete set of statistical reporting and a customer specific dashboard for monitoring real-time traffic
Category
Red Hat Certifications
This product has been certified to run on the following Red Hat products and technologies:
| Target Product | Level |
|---|---|
| Red Hat Enterprise Linux 7.x | Self-Certified |
