Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Code-X ONE

By: Code-X Inc. Latest Version: 2022Q4.1.1
Linux/Unix
Linux/Unix

Product Overview

Code-X ONE - This new foundation of cybersecurity enables continuous zero trust through dynamic and constant authentication, while simultaneously allowing granular micro-segmentation of all networks. Code-X ONE integrates seamlessly in all environments, increasing security with near zero overhead, making implementation and adoption a virtual and straight forward process. Working within all the major system and cloud providers (Hitachi, AWS, AZURE, Oracle and more) to easily eliminate security problems for the first mile and beyond. Forensic and compliance checkboxes for all dashboard and monitoring systems can help facilitate a true continuous zero trust environment without the requirement of packet filtering.

Code-X Intelligent Machine Authentication® is employed to create our unique, continuously changing and irreplicable authentication tag. Utilized in an explicit authentication process, Intelligent Machine Authentication® ensures a device continuously reverifies its authenticity, including TCP reconnect. This process establishes a true continuous zero trust environment across the enterprise, up to and including the endpoint.

Intelligent Machine Authentication® enables:

  • Secure authentication prior to communication, continuous Zero Trust enablement during.
  • The security of granular network micro-segmentation through a seamless and easily integrated user interface.
  • Secure authenticated communications between all system and end-point devices, including global networks and cloud infrastructure.
  • Logical server separation to the virtual machine no longer requires physical separation, with the ability to forensically prove all connections to all machines.
  • Eliminates lost credential issues and ghosting in a system.
  • Proactive security in a reactive industry.

Key benefits of Code-X ONE implementation:
  • A light footprint that allows all current encryption frameworks to continue to work. No need to radically change corporate policies. We adapt, not you.
  • We secure all communication and devices, from the cloud to mobile and the edge. This allows for the easiest initial deployment and product upgrades.
  • We are the only lightweight solution that enables "Endpoint to Enterprise", brining the first mile into the cloud and beyond.

Version

2022Q4.1.1

Categories

Operating System

Linux/Unix, CentOS 7.9.2009

Delivery Methods

  • CloudFormation Template
  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews