Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Cohesive Networks, formerly CohesiveFT, recently re-named to emphasize the company's focus on network security, has expanded their VNS3 product into a family of products that help enterprises secure and connect applications in public, private, and hybrid clouds. 


"With recent high profile, broad-reaching and sophisticated penetrations of firms such as JP Morgan Chase and Sony, it's increasingly obvious that simple perimeter level network defenses are insufficient," said Stephen O'Grady, Principal Analyst with RedMonk. "Combined with the fact that every portion of technical infrastructure is a target, application level security with encrypted segmentation is a must have."


Protection and performance:

VNS3:turret combines the company's connectivity technology with dataflow and compliance tools to create secure, redundant networks for each data center application. Because VNS3:turret encrypts and manages network traffic while also using adaptive compression, customers can avoid any serious network performance penalties.


"A secure micro-perimeter around each application builds 'defense in depth' with additional layers of security at the application edge," said Cohesive Networks Director of Marketing and Products, Ryan Koop. "Now, our customers can protect against both external exploits and unauthorized east-west access between
applications. VNS3:turret guards your network by routing traffic through encrypted switches."


VNS3:turret allows customers to:

 

Create a cryptographically unique micro-perimeter around each application.

Segregate applications to eliminate east-west vulnerability and monitor interior traffic.

Isolate and monitor all traffic to flow through the secure edge.

Automate compliance reporting with dataflow and monitoring tool integration.

Provide the most comprehensive application security model available today. 

Infosecurity Europe 2026 unveils keynote speaker line-up, linking military, sport, and tech...
A new WBBA report highlights the untapped potential of AI in telecoms beyond internal efficiency,...
Red Hat unveils its Digital Sovereignty Readiness Assessment tool to gauge organisational digital...
The Data Centre Alliance announces a new Advisory Board to guide strategic initiatives in the data...
Zenarmor launches a global channel programme designed to enable partners to deliver and manage...
Red Hat and NVIDIA have introduced a co-engineered AI platform aimed at supporting enterprise AI...
AI is being used alongside existing DevOps practices, with reported impacts on testing processes...
How Site24x7's new AI features aim to enhance IT operations, reduce recovery time, and ensure...