Graphic Airlock Secure Acces Hub

Cloud Security

Tried-and-trusted security in the data cloud

Cloud deployments are becoming ever more popular – not least because of their simplicity, speed, and seemingly lower costs. Even with business-critical applications, many companies are considering the cloud as an operational choice. On the other hand, opponents of cloud-based solutions often complain about patchy security and data protection concerns.

The secure access hub can also provide a secure foundation in the cloud. Airlock is designed for use in the cloud and automatically adapts to dynamic environments using DHCP and Cloud-init. Instances can be booted up quickly and simply from official Airlock cloud images, with absolutely no interactive installation required. Furthermore, clusters can be generated from active Airlock nodes by centralising session synchronisation. This allows for effortless scalability.

Airlock can be operated in the Azure Cloud as well. In the Azure Cloud the operation is also carried out in the BYOL model (Bring your own Licence).

Just try it.

Airlock can be quickly and easily deployed in the Google Cloud. Existing Airlock licenses can be used for operation in the Google Cloud. The operation follows the BYOL model (Bring your own Licence).

 

Just try it.

In order to stay technically viable in digital transformation, companies must increasingly switch to hybrid cloud environments so that their data, applications and services are available from anywhere in the world and around the clock. This in turn requires new security approaches as the data and applications become more exposed and thus offer more attack surface.

Read our whitepaper in cooperation with Deloitte and our partners eperi and SHE.

 

Cloud versus on-premise deployment

On-premise, in the cloud, private, public or even hybrid? There are plenty of deployment options to choose from and making a decision is not always easy. Whatever you go for, do not compromise on security – choose Airlock. The Airlock licensing model ensures that a migration to the cloud will not entail additional costs.

Comparison of the advantages of cloud and on-premises software:

Advantages in the Cloud
 

  • Lower servicing and implementation costs
     
  • Risk of service interruption due to physical malfunction covered by platform
     
  • Responsibility for infrastructure updates and patches delegated
       
  • Low initial investment costs
     
  • Standardised solutions work well if no custom requirements are set

Advantages on-premise
 

  • No hidden costs
     
  • Data retained by you (confidential data, GDPR)
     
  • Independence from dominant cloud providers
     
  • Potentially greater security. Cloud providers are increasingly becoming targets for hacking attacks.
     
  • Direct control of reliability of critical services
     
  • Generally, more flexible with regards to custom requirements and complex environments

 

Ready for excellent IT security?

Contact us now.
Ergon Informatik AG+41 44 268 87 00

Information for you

-Our whitepapers-

Executive View: KuppingerCole - Airlock Secure Access Hub for applications and APIs

This KuppingerCole Executive View report provides an architectural and functional overview of the Airlock Secure Access Hub, an integrated platform for secure access management - a multicloud-native security tool for web applications, APIs and beyond.

 

Fill out the form now and receive Executive View!

Whitepaper: Security for cloud-native applications

You can read about how companies can ensure the security of web applications and APIs in Kubernetes in the white paper "Security for cloud-native applications", which was created in collaboration between heise and Airlock.

 

Request whitepaper

Whitepaper: Zero Trust is a journey

The ongoing digital transformation of the world is progressing and having a profound impact on our personal and professional lives in ways that were difficult to imagine just a few years ago.


This white paper discusses the effects of continuous digitalization and its impact.

Request free of charge

Off to DevSecOps

In this white paper, you will learn the most important insights into how you can implement DevSecOps successfully and efficiently, which security components are required for this and the advantages of a microgateway architecture.

 

Request free of charge

Airlock 2FA - Strong authentication. Simple.

Double security - this is what two-factor authentication offers in the field of IT security.


Find out more about strong authentication and the possibilities offered by Airlock in our white paper.

Download for free

Further whitepapers

We provide you with free white papers on these and other topics:

 

  • Successful IAM projects
  • compliance
  • Data protection (DSGVO)
  • Introduction of PSD2
  • PCI DSS requirementsPCI DSS requirements
Request free of charge