top of page

ZTCAP,

Zero Trust Conditional Adaptive Policy

SHIELDGate applies security technology based on the Zero Trust model. When accessing the internet, it enforces policies based on ZTCAP and uses RBI to proactively block threats.

By applying the Zero Trust security model, it ensures a secure internet access service where users can safely use the content of the sites they connect to without any threats.

Enforces policies based on the access (usage) environment of the service.

No scripts from the site are executed at the endpoint.

The files downloaded from the accessed site undergo *harmless transformation (CDR) processing.

*CDR technology involves extracting only safe visual contents and

reconstructing the document, detecting malicious activities hidden

within the format in advance.

Replacing the Existing VPN with SHIELDGate

Execution of Conditional Adaptive Policies

  • By enforcing policies based on the access (usage) environment of the service, a diverse range of connection/block categories can be applied.

Providing 100% Isolated Secure Screens

  • Through web filtering, the trustworthiness of sites accessed by users is assessed, enabling isolated connections.
     

  • While ensuring that no scripts are executed on the user's terminal (endpoint), the internet user experience remains intact.

The downloaded files undergo *CDR processing

  • Files downloaded from the accessed site are safely processed internally through CDR technology.

*CDR technology involves extracting only safe visual contents and

reconstructing the document, proactively detecting any malicious

activities hidden within the format.

Do you have any questions about SoftCamp ZTCAP?

Inquire now.

bottom of page