DataCloak Completed Series B of 28 Million US Dollars Financing to Accelerate the Integration of Data-oriented Zero-Trust Network Security Architecture
DataCloak Successfully Hosted the 2020 ZTAT Summit
9月4日，由数篷科技主办的2020 ZTAT Summit零信任架构技术峰会在杭州成功举办。
DataCloak Officially Released Its HyperCloak® Enhanced Zero Trust Security Framework
2020年9月4日数篷科技在“2020 ZTAT Summit零信任架构技术峰会”上正式发布了HyperCloak®（凌界）增强型零信任安全框架。
Having Finalized Its $13M Series-A Funding, DataCloak Now Sets Its Focus on Zero Trust Data Security Technology
In the AI and 5G era, data prevail, and enterprises request for breaking the organizational boundary for the flow of data. However, it is noticeable that data are prone to fragmentation, isolation, and decentralization.
As a result, data management and utilization become an increasingly daunting challenge. Under such new circumstances, it is a shared challenge in the industry to figure out how to assure data security and make the best use of data, since data are enterprises' key assets and drivers of innovation.
The passivity of traditional defense models can no longer accommodate the requirements in the cloud computing, AI, and 5G era. In response to this issue, Forrester Research came up with the Zero Trust model —— a believer of the “never trust and always verify” policy and a next-generation enterprise security technology that gained overwhelming acceptance by the industry in recent years.
Compared with the Google-led BeyondCorp Alliance in terms of reputation as an early advocate and adopter of the Zero Trust framework, DataCloak not only make finer-grained management and faster deployment in common corporate environments, but also, more importantly, realize dynamic data security.
DataCloak sees security as a part of the infrastructure. For previous-generation enterprises, a secure workplace is built within a physical boundary; but for next-generation enterprises, a secure workplace will be defined and built by software. Based on the Zero Trust framework, DataCloak sets up virtual, private, flexible, and intelligent workplaces for enterprises, covering office, cloud computing, and edge computing scenarios. In the workplace, secure data flow among these scenarios is attainable, hence this workplace is also known as a "Zero Trust Adaptive Secure Computing Platform". By enabling cross-organizational data flow and sharing, the value of data is unleashed!
Leading Technical Architecture
Help enterprises attain the supreme grade in the Zero Trust architecture
standard--Data Security Architecture
Instilling China’s wisdom into the global development momentum of the Zero Trust structure
Assurance for data security in acquisition, storage, processing, transmission, exchange, and destruction
User-friendly and Efficient Operation as Well as Maintenance
Time of deployment and initialization reduced from one week (168 hours) to 1 hour
Smooth Experience for Promotion
Unwitting product operation with no impact on endpoint performance
Highly Cost-effective and Reliable Solution
At least 57% lower TCO cost than VDI