CGW – Quick Deployment Guide

1. Introduction Adjacent to the internal applications running in a public cloud, data center, or on-premises server, Exium places a small piece of software called Cyber Gateway (CGW), deployed as a VM or bare metal, which is used to extend a highly secure Zero Trust Path out to the Intelligent Cybersecurity Mesh. Its deployment is […]

CGW High Availability Setup – User Guide

1. Introduction Current document describes steps to setup CGW in High Availability (HA) mode. User must understand concepts of Secure Private Access (SPA) first before navigating to below document. Please refer below user guide to get more details on Secure Private Access (CGW) and CGW. Secure Private Access – User Guide How it works? CGW […]

General Data Protection Regulation (GDPR)

The GDPR stands for the General Data Protection Regulation, which is a comprehensive EU data protection law, adopted in May 2016, updating the existing EU data protection law (the 1996 Data Protection Directive) to further strengthen the protection of personal data of individuals in the EU. It takes full effect on May 25, 2018.   […]

International Organization for Standardization (ISO 27001)

ISO 27001 provides an international methodology for implementing, managing, and maintaining information security within a company. This information security management system (ISMS) framework minimizes risk and ensures business continuity by proactively limiting the impact of a security breach. ISO 27001 is a globally recognized information security standard, with more than 40,000 organizations certified.   ISO […]

Service Organization Controls (SOC2)

SOC2 is a compliance report standard defined by the American Institute of Certified Public Accountants (AICPA). These SOC2 compliance reports provide users with assurances about the controls at a service organization relevant to security availability and processing integrity of the systems used to process users’ data. It also covers the confidentiality and privacy of the […]