Security for sensitive data
IT security is one of the greatest challenges companies are facing today. The theft of data, attacks on applications and possible attacks on an organisation’s digital infrastructure can quickly lead to serious damages; both in terms of reputation and the legal and financial consequences for companies.
Airlock protects what many organisations fear: data theft, cyber attacks, and attacks on applications. Airlock impresses with many powerful features developed from the expertise of experienced specialists. This expertise is probably the best guarantee for security solutions that anticipate tomorrow's risks, today.
Airlock Highlights - Data security
- Protection against the OWASP Top 10
- Strong authentication
- Support for hardware security module (HSM) devices
- Virtual patching
- Security information and event management (SIEM)
- Risk-based authentication
- Transaction signing
The figures are clear, in 2018, attacks at the application level (OWASP Top 10) more than doubled. That's why comprehensive protection of web applications and APIs is a business-critical task for every company today. The consequences of security gaps can be grave. On the one hand, there are direct consequences of successful attacks, such as service failure, production downtime, data loss and loss of trust among customers and partners. On the other hand, high penalties of up to 4 per cent of annual revenue are now imminent.
Airlock has made us agile and secure. Because it provides the upstream security layer that enables us to develop what is really important: convincing digital services for our customers.
Martin Burri, IT Security Officer Visana
Airlock's Secure Access Hub protects applications, APIs and data against identity theft: the most common attacks on Web applications and the OWASP Top 10 such as SQL Injections or Cross-Site Scripting (XSS).
A highly skilled security team
According to a study by Whitehat Security, high-risk vulnerabilities remain unresolved for an average of 196 days. Even critical security vulnerabilities remain open for an average of 129 days and can be exploited by attackers. But things do not have to be this way. If new application-level vulnerabilities emerge, Airlock can immediately apply a ‘virtual patch’ that blocks attack attempts and provides sufficient time to update the vulnerable applications. The Airlock Security Team actively monitors new developments in the hacker scene and provides timely hotfixes for Airlock products.
The OWASP Top 10 API Security threats
APIs are likely to develop, over the coming years, into the main attack surface for web applications. OWASP is responding to this with a new and specialised top ten list for API security. Read the specialist article published in Heise Magazine to find out more about the new OWASP Top 10 list, the background and responsibilities.
Zero Trust is a journey
The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles. Lern more about the effects of ongoing digitization and how it affects modern information technology
The two-factor authentication (2FA, MFA or SCA for short) in the area of IT security offers double the security. In combination with efficient customer identity & access management (cIAM), numerous processes are significantly simplified. Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.
From spoilsport to the pioneer of digitisation
Digitisation is presenting businesses with new challenges which go far beyond information technology. This primarily relates to an aspect which is becoming increasingly important: IT security. Learn how IT security is accelerating digitization.
In order to stay technically viable in this digital transformation, companies must increasingly switch to hybrid cloud environments. This requires new security approaches as well as a mature customer identity and access management system. Learn more about this topic in our whitepaper in cooperation with our partners Deloitte, eperi und SHE.