ColorTokens Xtended ZeroTrust Platform Description

The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects the inside with unified visibility, microsegmentation and zero-trust network access. It also protects endpoints, workloads, and endpoints with endpoint protection. Visibility across multiclouds and on-premise. Protection of cloud workloads via micro-segment Stop ransomware taking control of your endpoints. You can see all communications between processes, files and users. With built-in vulnerability and threat assessment, you can identify security gaps. Simpler and quicker time-to-compliance for HIPAA, PCI and GDPR. You can easily create ZeroTrust Zones™ and dramatically reduce the attack surface. Dynamic policies that protect cloud workloads. Without the need for cumbersome firewall rules or VLANs/ACLs, you can block lateral threats. By allowing only whitelisted processes, you can lock down any endpoint. Stop communication to C&C servers and block zero-day exploits.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
ColorTokens
Year Founded:
2001
Headquarters:
United States
Website:
colortokens.com/xtended-zerotrust-security-platform/

Media

Recommended Products
CDPs: Build, Buy.. or Both? Icon
CDPs: Build, Buy.. or Both?

Collect, Unify & Connect Data Real-Time, Real Fast

Explore how a customer data platform can help to enhance your engineering team's efficiency and supercharge application performance.

Product Details

Platforms
SaaS
On-Premises
Type of Training
Documentation
Customer Support
Phone Support
Online

ColorTokens Xtended ZeroTrust Platform Features and Options

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cloud Workload Protection Platform

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

ColorTokens Xtended ZeroTrust Platform Lists