153 to cover and the cloud workloads , configuration , data and applications are protected by CloudForte ,” she says . “ These products are all complementary to address all the layers of that cake .” Cavanna agrees and affirms that the three tools are a great foil for the other . “ A lot of organisations are realising that VPN probably isn ’ t the way to go anymore and cloud is becoming the choice ,” he says . “ We have that ability with CloudForte to ensure everything is considered properly . With Stealth , you have the security overlay and if you implement Stealth with the microsegmentation it reduces your cost in relation to manpower and decreases the reliance on dozens of different security tools and reduces complexity massively . These three tools complement each other fantastically well .”
www . technologymagazine . com