Security News > 2021 > April > Guardicore extends microsegmentation and zero trust security to protect legacy infrastructure and IT

Guardicore extends microsegmentation and zero trust security to protect legacy infrastructure and IT
2021-04-09 00:30

Guardicore announced new capabilities that extends microsegmentation and zero trust security to the industry broadest catalog of legacy servers, applications, and operating systems.

Customers using Guardicore Centra to protect their hybrid data centers that include legacy servers can now extend zero trust policies and granular microsegmentation to IBM iSeries AS/400 servers.

"Guardicore Centra gives CISOs an alternative to legacy firewalls to enforce microsegmentation and zero trust controls on critical legacy servers and modern environments from the same platform."

"Securing legacy systems requires full visibility of existing legacy assets and the ability to segment them from network traffic. Firewalls are not built to protect legacy systems at the granular level required for zero trust control," said Mario Procopio, founder and managing director, Pro CISO. "Microsegmentation provides deep visibility to eliminate legacy blind spots and easily deploys across all infrastructure and workloads - including data centers, cloud, modern applications as well as legacy systems - to prevent lateral movement and eliminate legacy security gaps."

Guardicore Centra is the industry's only platform to extend microsegmentation and zero trust principles to protect IBM iSeries AS/400 - one of the most used legacy servers in the world with more than 100,000 companies across banking, healthcare, manufacturing, and other critical industries relying on them.

Broadest coverage for legacy systems: Guardicore Centra secures more legacy systems than any other microsegmentation platform in the industry - including end of support operating systems Windows Server 2000 through 2008, Windows 7, Windows XP; all Linux distributions; IBM AIX, IBM iSeries AS/400, Oracle Solaris, and HP-UX. Automated policy enforcement: Organizations can set microsegmentation policies and security rules in real time using combinations of 'allow' and 'block' policies across the entire legacy infrastructure, preventing malicious traffic from reaching critical servers.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/5si3qLfAn_o/