ZTCAP,
Zero Trust Conditional Adaptive Policy
SHIELDGate applies security technology based on the Zero Trust model. When accessing the internet, it enforces policies based on ZTCAP and uses RBI to proactively block threats.
By applying the Zero Trust security model, it ensures a secure internet access service where users can safely use the content of the sites they connect to without any threats.
Enforces policies based on the access (usage) environment of the service.
No scripts from the site are executed at the endpoint.
The files downloaded from the accessed site undergo *harmless transformation (CDR) processing.
*CDR technology involves extracting only safe visual contents and
reconstructing the document, detecting malicious activities hidden
within the format in advance.
Execution of Conditional Adaptive Policies
-
By enforcing policies based on the access (usage) environment of the service, a diverse range of connection/block categories can be applied.
Providing 100% Isolated Secure Screens
-
Through web filtering, the trustworthiness of sites accessed by users is assessed, enabling isolated connections.
-
While ensuring that no scripts are executed on the user's terminal (endpoint), the internet user experience remains intact.
The downloaded files undergo *CDR processing
-
Files downloaded from the accessed site are safely processed internally through CDR technology.
*CDR technology involves extracting only safe visual contents and
reconstructing the document, proactively detecting any malicious
activities hidden within the format.