Sixth Flag: Securing the Cloud through Cell Structure Security
February 08, 2016
The Sixth Flag, Inc. has produced a unique solution to cloud security. The company’s Cell Structure Security applies to its cloud-based Workspace-as-a-Service platform. Beyond your typical virtual desktop solution, this platform is all about centralization, security, and ubiquitous access achieved through a web browser.
The Cell Structure Security system allows for the containment of threats through componentized isolation. This modular approach to reducing the threat vector surface focuses on the continual containment of the spread of infections and the isolation of systems that have been compromised. The approach scrambles the credentials of users in every session, while totally encrypting data both in transit and at rest. At the end of the each session or completion of task, the user’s workspace, minus any data, is destroyed. This approach helps harden a system, while mitigating compromise of nearly all types.
Applied to the cloud, the approach secures data as it is in transit across infrastructures of client environments and a number of disparate clouds. The same approach also helps reliability, scale, and performance by applying granular principles in its central management construct.
Company founder and CEO Pete Kofod states that he founded the company based on his military experience, and recognized the opportunity to apply granular concepts to cloud services for a better security profile. Kofod states that compromise is an inevitable reality, and the industry has largely focused on a combination of hardening points of failure and integrating centralized authentication systems. Kofod feels that thanks to the features of his product, the cloud can be considered an asset over a liability.
The cloud cell security approach is an interesting proposition that applies sensible principles of segmentation and minimizing risk. The cloud security industry is currently booming, and alternative, specialized security technologies are receiving praise as well as opportunities alongside traditional security approaches.
Edited by Kyle Piscioniere
Article comments powered by