• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Managed Service, Network Security, News

BlackBerry Launches Zero Trust Network Access Solution with CylanceGATEWAY

Blackberry, CylanceGATEWAY unveiled a new ZTNA solution designed to defend against evolving threat landscapes.

June 10, 2022 TD Staff Leave a Comment

Zero Trust, ZTNA, Blackberry
Olivier Le Moal/stock.adobe.com

Security software and services provider BlackBerry Limited unveiled a new zero trust network access (ZTNA) as-service with CylanceGATEWAY. The new service is designed to securely enable remote workers and prevent malicious threat actors from compromising corporate networks using advanced AI-driven cybersecurity.

Available to customers globally from July 2022, CylanceGATEWAY will provide businesses of all sizes with a contextual correlation of network and device telemetry combined with continuous authentication to limit access to trusted, authenticated, and known users and devices; augmenting their prevention-first cybersecurity posture to protect against the prolific growth of ransomware and other advanced cybersecurity threats.

A  IDC survey on the Security Services market highlights, “attack surface management, data security and identity access management” as the top three use cases organizations face when implementing Zero Trust strategies. According to BlackBerry Limited, CylanceGATEWAY works alongside CylancePROTECT and CylancePERSONA to deliver against the full spectrum of use cases.

BlackBerry’s ZTNA-as-a-service solution is designed to help solve many of the challenges NetOps, SecOps, and IT leaders experience when implementing, managing, and scaling secure access solutions, including:

  • Secure access from any device, on any network, to any application.
  • Dynamic risk reduction and access control using Cylance AI (now in its 7th generation having trained on more than a trillion diverse threat data sets over several years of front-line operations).
  • Protected connectivity and zero-day phishing detection.
  • Detection of lateral movement attempts using the MITRE ATT&CK framework rules.
  • Seamless and secure connectivity for BYOD deployments including connecting to Microsoft 365 for secure cloud connectivity.

“Covid has laid waste to the old castle and moat approach to network security with the majority of employees no longer constrained to corporate campuses but still requiring a secure and frictionless way to access the resources they need to get their jobs done,” said Billy Ho, EVP of product engineering, BlackBerry, in a statement.

“Our new CylanceGATEWAY ZTNA-as-a-service solution enables businesses to do just that, defending against an evolving threat landscape and providing end-to-end protection for endpoints, users, their identities, and the applications and networks they connect to, so businesses can have peace of mind,” said Ho.

“In the face of a complex and ever changing threat environment in which malicious cyber actors are increasingly employing off-the-shelf ransomware-as-a-service (RaaS) and malware-as-a-service (MaaS) tools to execute malicious attacks at scale, implementing a Zero Trust strategy has quickly gone from being a nice-to-have to a ‘must-have’; something which is validated by our most recent Security ServicesView which illustrates how we’re nearly at a point where organizations who have not taken the plunge are the exception rather than the rule,” said Craig Robinson, program director, security services at IDC, in a statement. “Adding capabilities that reduce the ability of unwanted lateral movement by assuming every user, endpoint, and network is potentially hostile until identity is authenticated is a welcome control point.”

Tagged With: ransomware, Zero Trust, ZTNA, ZTNA-as-a-service

Related Content:

  • No More Ransom SMBs Are Grappling with Paying Ransom Demands
  • Tenable Cloud Security with Agentless Assessment and Live Results Tenable Announces Cloud Security Agentless Assessment for Faster…
  • Zerto AWS Zerto Joins AWS ISV Workload Migration Partner Program
  • Bluesound Professional B170S Networked Streaming Stereo Amplifier Bluesound Professional Launches B170S Networked Streaming Stereo Amplifier

Free downloadable guide you may like:

  • Blueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.