Safe-T, a provider of secure front-end and enterprise collaboration solutions, announced the launch of its disruptive front-end perimeter security solution, RSAccess Secure Front End.

In response to a rising number of cyber-attacks, many organizations have added a DMZ (demilitarized zone) to prevent outside users from gaining direct access to company confidential data. This approach, however, can put sensitive information that resides in the DMZ at risk. What's more, organizations usually deploy a reverse-proxy solution that maintains incoming firewall ports from the DMZ to the internal network of the organization thereby exposing the internal network to cyber-attacks. 

RSAccess eliminates the need to store sensitive data in the DMZ and to maintain incoming firewall ports, which can expose the internal network to cyber-attacks. RSAccess reduces the risk of cyber-attacks and simplifies network configurations resulting in reduced operating expenses and the costs associated with data loss.

Utilizing two nodes, one on each side of the firewall, RSAccess receives requests and streams data, rather than the traditional method of storing sensitive data in the DMZ. RSAccess inspects and controls incoming traffic on the application layer to detect and mitigate attacks of viruses, Trojans and malware both on clear channels and encrypted channels such as HTTPS.

RSAccess paves the path to the elimination of the traditional role of the DMZ and improves security by closing incoming firewall ports, preventing hackers from accessing the internal network and eliminating sensitive data from the applications servers and database in the DMZ.  This technology can also be used to secure connectivity between classified networks in the organization without exposing one sub-network to another.

Providing an immediate cost savings by eliminating duplicated application licenses and the hardware costs of front-end servers, RSAccess also introduces operational efficiency by eliminating the need for constant data synchronization between the internal application servers and the servers at the DMZ.