Nile unveils series of new security capabilities to secure users and devices against threats

Nile announced a series of new security capabilities designed to protect against threats that have long plagued wired and wireless networks.

Nile security capabilities

Based on the principles of zero trust, Nile’s secure-by-design approach removes the complexities that have exponentially increased the cost and effort required to secure users and devices against advanced threats. Threats are designed to take advantage of gaps in an organization’s security posture that allow attackers to easily gain access to their network, discover other devices, and move silently across the network to achieve their ultimate objective.

“The network industry has imposed an immense burden on organizations, often forcing teams into uneasy compromises,” said Suresh Katukam, CPO at Nile. “These organizations either need to invest heavily to secure traditional networks – often beyond their means – or hope they aren’t simply targeted. With cyberattacks and data breaches on a steady rise, we believe ‘hope’ is a strategy no organization should utilize. Our mission is to remove the need for compromise and deliver secure connectivity, without the need for costly configuration and management.”

The following benefits are offered as part of Nile’s core network as a service offering:

  • Zero trust access. Unifies access for all wired and wireless devices while invoking strict identity-based authentication and authorization to the network. Every user and device, human or IoT, is authenticated and authorized before providing any access to the Nile network.
  • Zero trust isolation. Eliminates malware proliferation by isolating every user and device from all other users and devices on the Nile network. Organizations can now centrally manage and enforce security policies at their firewall, and inspect campus traffic for possible malicious activity.
  • Zero trust network. Every element within the Nile network is authenticated through Mutual Trust Access Control (MTAC) to prevent rogue insertion. Communication between all wired and wireless devices across the network is encrypted through an end-to-end built-in MACsec. Integrated WIDS/WIPS continuously monitors for unauthorized or malicious wireless activity.

“Malware is always a concern, a constant worry for the leaders,” said Rahul Gupta, head of security, IT and compliance at Sigma Computing. “But with Nile’s traffic isolation, we are better able to mitigate against potential malware threats and enable enhanced IT security built on zero trust. Nile (NaaS) services have increased our productivity with reduced and predictable costs. It minimizes operational risks in the network, as the solution is designed with proactive management to address and mitigate network issues before they can lead to an outage.”

“Cyber-attacks are an unfortunate reality, there’s no getting around that, advanced threats are ever present in today’s world,” said Neil Clover, CTO at SDI. “Nile’s unique system of authentication works to prevent unauthorized users and devices from gaining access to our network. In addition, their system-wide approach to zero trust helps reduce the potential for man-in-the-middle and rogue device threats.”

More about

Don't miss