Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

1/26/2021
12:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

TetherView Launches Digital BunkerTM, a Comprehensive One-Way-In and One-Way-Out Private Cloud for Enterprise Customers

Available starting today as a hosted service or solution, Digital Bunker(TM) is a complete IT infrastructure solution, enabling businesses to provide their employees with a trusted, secure virtual environment while managing inbound and outbound data access, security, compliance, disaster recovery, mobility, and more.

1/26/2021 -  TetherView, a leading provider of custom-tailored enterprise solutions designed to bring businesses safely and securely into the cloud, is pleased to announce the launch of Digital Bunker™, a comprehensive one-way-in and one-way-out private cloud solution for enterprise customers. The Digital Bunker enables businesses to provide their employees with a trusted, secure virtual environment, custom-tailored to their specific industry and compliance requirements. Through Digital Bunker, businesses can see, touch, audit, and prevent all access to their sensitive data, while providing their employees with a scalable high-performance workspace. Pricing is a flat fee per user and is dynamically scalable based on performance requirements.  

Digital Bunker enables businesses to dramatically simplify their IT infrastructure by integrating all of the IT services that businesses need within one comprehensive platform, including security, compliance, disaster recovery, mobility, and more.

“The major trend in enterprise cloud solutions today has been to bring all the data to all employees everywhere,” said Michael Abboud, CEO and founder of TetherView. “For companies dealing with sensitive information or compliance requirements,  this “open data” approach does not work. Through Digital Bunker, businesses can protect their remote employees and their valuable data within a one-way-in and one-way-out private cloud. Digital bunker lets you optimize your infrastructure so your IT team can focus on innovation.” 

Tetherview’s Digital Bunker solution is built to the NIST/ISO Framework following the compliance requirements of NYSDFS 500 and CMMC  and/or other agreed-upon compliance standards. Tetherview’s data centers, equipment, and solutions are all SSAE 16 and SOC 2 certified. This allows Digital Bunker to be used within security-sensitive industries, such as financial service providers, aerospace and defense industries, as well as midsize and Fortune 500 companies.   

The Digital Bunker is the only Private Cloud solution that is Soc 2 Type 2 certified out of the box, offering companies a complete and easy path to compliance.

TetherView Digital Bunker can be delivered as a service or a solution. Whether an enterprise needs a turnkey cloud solution or wants to enable AWS or Azure, TetherView has an approach that meets its needs.

Key Features at a Glance:

·  Secured Workspace: Users access data in the Digital Bunker through a secured virtual environment specifically configured to their hardware requirements. This makes TetherView’s solution able to be infinitely scalable to fit the needs of both regular users, as well as high compute designers and developers. Users can log on via a single device-agnostic sign-on solution.

·  Simplified IT Infrastructure: Each Virtual Desktop is managed by TetherView – which means all data backups, systems patching, virus protection, and other business-critical tasks are managed by TetherView. Pricing is handled per user and is scalable based on performance requirements. 

·  Secured Data Sharing: Data Sharing is handled through TetherView’s Sync™ and TetherViews’ Pocket Protector™ platforms. TetherView Sync provides users with a singular secure location for hosting files that can be shared as an attachment or link inside or outside of their business network. TetherView Pocket Protector™ uses industry-leading end-user computing (EUC) technologies to help a business deliver and manage any application on any device—simply and securely.

·  Infinite Scalability: TetherView’s Remote workforce Dashboard™ enables IT departments to easily manage and scale virtual desktops as they are needed, as well as manage and monitor all inbound and outbound data access. This allows businesses to greatly reduce their IT overhead.

·  Ease of Deployment: Because TetherView groups together all of the tools that a business needs into one comprehensive package, IT overhead can be greatly reduced.

·  Lowered Costs: TetherView’s flat fee per user model is scalable based on the exact needs of a businesses’ employees.

·  Compliancy for both remote employees and contractors: TetherView’s solutions are built to the NIST/ISO Framework following the compliance requirements of NYSDFS 500 and GDPR and/or other agreed-upon compliance standards. TetherView’s data centers, UE, and solutions are all SSAE 16 and SOC 2 certified. Essentially, this greatly accelerates the speed at which IT departments can achieve full compliance (all they have to handle is their own application security and protocols). TetherView is the only Compliant Desktop out of the box. The entire end-user experience has been audited and certified. 

·  Cost Reduction:  All data backups, systems patching, virus protection, and other business-critical tasks are managed by TetherView. This allows businesses to greatly reduce their IT footprint. Pricing is handled per user and is scalable based on performance requirements. 

About TetherView:

Founded in 2014 in Oceanport, NJ, TetherView is a developer of industry-leading solutions that bring employees directly to the data that they need, regardless of what platform they are accessing it from. We enable businesses to see, touch, audit, and prevent all access to their sensitive data, while providing employees with a custom-tailored virtual desktop experience. Our products keep business data secure and accessible, all while ensuring the highest levels of compliance. For more information, please visit www.tetherview.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.