Marble Cloud, formerly IronKey has a developed a cloud access management solution that includes Marble App, Marble Network and Marble Cloud management services.
The solution, entitled Marble Access is compatible with any Windows, Linux or iOS endpoints— most notably, iPhones, iPads, Macs, PCs and Android smart phones or tablets. By incorporating an end-to-end hardened environment, Marble Access protects against a number of attacks including Trojans, man-in-the-middle, man-in-the-browser, malevolent Wi-Fi networks and DNS poisoning.
Marble Access enables secure multi-layer environment for cloud access on any employee-owned device enabling companies to cut IT costs. Additionally, Marble Access reduces risk and complexity associated with bring-your-own-device (BYOD) and cloud services by utilizing an extended enterprise IT infrastructure.
The significance of Marble Cloud’s solution is simple, any user— contractor, remote worker or customer— can securely access enterprise, public and private clouds, in any location on any of their personal devices. The cloud-based solution also protects users’ personal devices from malware, prevents data loss and eliminates costs associates with hardware and management.
The three components of Marble Access are as follows:
Marble App. Easily download and installed from anywhere in the world, the Marble App is self-configuring, based on policies defined by enterprise on the Marble Cloud management service. The Marble App is hardened and isolated from malware and keystroke loggers, making it the safest way to access cloud services regardless of the device.
Marble Network. The solution’s VPN service, Marble Network allows end users to access the on-the-go VPN service, which encrypts all cloud access on any Wi-Fi hotspot in the world. Secure DNS with real-time blacklists prevents fraudulent acts like phishing, malware distribution and access to corrupt websites.
Marble Cloud. The solution’s management service, Marble Cloud allows IT Administrators to easily define policies across PC and mobile device platforms for cloud access control, endpoint security, VPN configuration, cloud access whitelists, malware scanning and jailbreak detection on the cloud service. A risk dashboard gives full visibility and control to the IT Admin, including employee and consultant use of the system.