{"maxtimeb":1434355507,"blinks":[{"id":"7321","when":"1434355507","title":"Developed a proxy\/policy-based secure cloud gateway w\/user mitig","description":"The FireLayers Secure Cloud Gateway enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application on any device by any user. Until now, CISOs were forced to choose between blocking or allowing cloud apps. Now, with FireLayers they can define and enforce adaptive security policies to prevent data breaches in any cloud app. \nFireLayers protects against malicious attackers, account hijacking, unintentional risky behavior, unauthorized BYOD, and 1000s of other risks inherent in using cloud apps. \nPrevention capabilities include:\n-\tControl Over Any App: vendor agnostic, granular level control of any resource\n-\tUser Centric Prevention: real-time prevention via interactive mitigations\n-\tPolicy-Based Architecture: define custom policies, roles and alerts\n-\tOpen & Extensible: integrates with any API and 3rd party security or monitoring tool\n-\tFull Stack Security: protects from network, device, OS, IP, app, and content to work flows.","lat":"37.4846","lng":"-122.203","url":"http:\/\/www.firelayers.com","source":null,"category_id":"1","category_name":"Major Milestones","ba_mode":"startup","ba_id":"222233","ba_name":"FireLayers","ba_description":"The FireLayers Secure Cloud Gateway enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application on any device by any user. Until now, CISOs were forced to choose between blocking or allowing cloud apps. Now, with FireLayers they can define and enforce adaptive security policies to prevent data breaches in any cloud app. \nFireLayers protects against malicious attackers, account hijacking, unintentional risky behavior, unauthorized BYOD, and 1000s of other risks inherent in using cloud apps. \nPrevention capabilities include:\n-\tControl Over Any App: vendor agnostic, granular level control of any resource\n-\tUser Centric Prevention: real-time prevention via interactive mitigations\n-\tPolicy-Based Architecture: define custom policies, roles and alerts\n-\tOpen & Extensible: integrates with any API and 3rd party security or monitoring tool\n-\tFull Stack Security: protects from network, device, OS, IP, app, and content to work flows.","ba_url":"http:\/\/www.firelayers.com","ba_logo":"http:\/\/www.startupblink.com\/uploads\/eedf7aa24557712a24ba18f7f7872a77.png","ba_lat":"37.48609924316406","ba_lng":"-122.2229995727539","ba_city":"Redwood City","ba_claimed":"3744","ba_country":"United States","ba_status":"1"}],"blinkids":"7321","fromsearch":true}