Cloud - 1.15.0

New Features

Dynamic Tagging

Introducing the Dynamic Tagging feature, designed to significantly enhance policy enforcement and network security. This automated entity tagging system empowers administrators to automate security management by automatically assigning tags to devices and users based on predefined criteria. Dynamic Tagging ensures consistency, reduces manual effort, and minimizes errors in managing access controls. By integrating real-time updates on device and user status, administrators can maintain an optimal security posture and respond proactively to potential threats.

Dynamic Tagging provides precise control over resource access, enforces compliance with regulatory requirements, and strengthens overall network security through micro-segmentation and automated access control decisions.

Benefits of Dynamic Tagging:

  • Consistency and Automation: Automatically assign tags to devices and users based on predefined criteria, eliminating manual labeling, saving time, and reducing errors.

  • Compliance and Security: Map dynamic tags to specific security policies to streamline compliance auditing and verification processes, ensuring adherence to regulatory requirements.

  • Micro-Segmentation: Automate access control decisions to strengthen overall network security. Automated micro-segmentation reduces the risk of data breaches by limiting access to specific resources.

  • Simplified Management: Streamline access control tasks with automated workflows, reducing manual configuration efforts, minimizing human error, and simplifying security management.

  • Precise Control: Ensure that only authorized users and devices with the appropriate tags can access specific resources, enhancing security.

  • Enhanced Threat Response: Near real-time adjustment of access controls based on asset conditions enhances threat response capabilities, minimizing the impact of potential breaches by quickly isolating compromised devices or users.

  • Ease of Use: Dynamically manage access controls in complex network environments with ease. Dynamic micro-segmentation allows for granular control, further enhancing security by limiting the attack surface.

Example Use Case:

Scenario: An organization seeks to enforce security policies based on the risk status of devices seeking access to the network.

Dynamic Tag Configuration:

  • Criteria: Device attribute: “Bitdefender - Risk Score”

  • Condition: If the Risk score is "High"

  • Tag Title: "Risky Device"

Outcome: Devices with a high-risk status are automatically tagged with the 'Risky Device' tag, triggering actions such as network quarantine or remediation. This action may include the application of pre-defined firewall rules that restrict the device's access to network resources to effectively mitigate potential threats.

GeoIP in Firewall Rules

We support the use of GeoIP in Firewall Rules. This enables administrators to manage traffic going through the gateway based on the originating country.

  • Administrators can choose "Location" for either the source or destination when creating a firewall rule. GeoIP selection is then completed by choosing the desired countries.

  • Integration of GeoIP allows blocking or allowing IP addresses associated with specific countries, improving network security management.

This feature is available on Gateway 13.7.0

Trusted Networks

We have added Trusted Networks functionality, allowing administrators to define trusted networks for their environments and control the use of Timus Connect.

  • Designate specific networks as trusted, automatically terminate tunnels and simplify the user experience. Alternatively, with the help of Always-On functionality, enforce connectivity to gateways when users connect to untrusted networks, thus strengthening security by ensuring encrypted access to sensitive resources.

  • Trusted networks can be defined in Settings -> Configuration -> Trusted Networks. Trusted networks seamlessly integrate with agent profiles. Connections automatically turn on or off based on network trust, improving security management and reducing administrative overhead.

Connector Logs

Connector Logs page has been added, allowing administrators to monitor site-to-site connector events. Administrators can access these logs directly from the detail screen of gateway sites through the View Connector Logs option.

This feature is available on Gateway 13.6.0

Web Filter Custom Ports

  • Web filter now supports monitoring custom ports for web traffic in addition to the default ports 80 and 443.

This feature is available on Gateway 13.7.0

Enhancements

Tags can be used in ZTNA user sign-in policies to extend applicability of tags beyond agent profiles and firewall rules.

Benefits:

  • Tag-based policies simplify policy creation and reduce administrative overhead. Administrators can define access rules that adapt to dynamic network conditions and user contexts.

  • ZTNA policies with tags strengthen overall security by enabling more flexible and context-aware access controls across the network infrastructure.

User Interface Improvements

Timus Manager user interface has undergone a comprehensive facelift to enhance the user experience, stability, and performance:

  • Modern, clear typography for improved readability.

  • A new color palette that aligns with contemporary design standards and enhances visual appeal.

  • Updated icons that provide a fresh, intuitive look.

  • A modular approach to UI elements for greater flexibility and consistency.

  • All UI elements have been updated to adhere to stringent design principles, ensuring a user-friendly interface.

  • Added breadcrumb navigation.

Resolved Issues

We have implemented several minor issues to improve overall performance and user experience. These fixes address several small issues to ensure smoother and more reliable operation across the platform.

Last updated