The core building blocks of the Cyolo platform are Identity Access Controllers (IDACs) and Edges.
IDACs terminate the Transport Layer Security (TLS) 1.3 connections and enforce the access policies configured by the cyolo administrator.
Cyolo does not require a cloud connection or the installation of an endpoint agent.
How the CyOLO Platform WorksFigure 1 shows the architectural layout of a Cyolo deployment.
Identity Access Controller: Type 1 security controls for the secure remote access space.
Figure 7 – Cyolo End-User Applications PortalOne additional feature worth noting is the Cyllo platform’s management of Remote Desktop Protocol (RDP) connections into OT environments.
Cyolo no longer breaks into systems, but instead logs in.
Making access security more complex and also more important than ever before.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply