The solution is deployed as a software licence, with three levels of support available on a ‘price per user per month’ basis. It facilitates endpoint visibility and management, secure remote access for employees irrespective of location, and automated threat intelligence and response.
The new offering provides transparent visibility to each endpoint, so IT teams can control individual compliance. It also ensures that endpoint-borne risks, such as firewall weaknesses or unsecure home routers, will not pose a threat to corporate networks.
Tim Mercer, CEO, Vapour (pictured), said, “We all know that the traditional 9-5 is long gone, with employees seeking increasing flexibility from their working day – especially when it comes to location. Many people are keen to remain at home, some are hungry to return to the workplace, and others want the fluidity to decide from one day to the next.
“Hybrid working is definitely the future, but this isn’t the easiest to manage from a network security perspective. This is exactly why we’ve launched this solution – it’s powerful technology designed to liberate businesses, as they move forward in a post-Covid world.”
The company recently carried out market research that indicated most organisations are reliant on VPNs only, but the cost and time associated with managing this approach to network security means the solution is usually available for a limited number of senior colleagues alone.
Salim Ramzan, senior network engineer, Vapour, added, “The beauty of our software-focused solution to secure hybrid working, is that it is technically brilliant, but operationally effortless. That’s the benefit of investing in a security-first cloud architecture – security lies at the heart of it, rather than it being an afterthought.
“For example, a sandbox feature automatically identifies potentially malicious inbound content, sends it to Fortinet and explores its validity, in seconds, before allowing it to land in the recipient’s inbox. If the sandbox is dissatisfied with the outcome, the content is held and the IT director is alerted so that they can investigate it further, in a secure environment, if they wish.”