Cloud 101CircleEventsBlog
Missed CSA's Cyber Monday sale? You can still get 50% off the CCSK + CCZT Exam & Training Bundle and Token Bundle with raincheck code 'rcdoubledip24'

STAR Registry Listing for

Vortex

Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.

Vortex

Cyberstanc Vortex: Reinventing Secure Data Transfer

Cyberstanc Vortex revolutionizes secure data transfer between networks, offering a comprehensive solution with innovative features.

Features

File Simulation Intelligence:
- Utilizes Simulation Intelligence and Signature-less detection.
- Bridges gaps in current solutions for enhanced security.

AI-Powered Threat Prevention:
- Exceptional detection accuracy surpassing traditional anti-virus solutions.
- Reduces false positives and saves valuable time/resources.

File Sanitization:
- Unique "Report, Remove, and Sanitize" feature.
- Prototype framework covers endpoint, network, email, and storage protection.

Advantages

Detection Accuracy:
- Examines metadata, file structure, and relationships between files for effective threat identification.
- Provides detailed actionable intelligence for security teams.

  • Transparency and Accountability:

    • Built with a strong emphasis on transparency for trusted results.
  • Privacy Protection:

    • Strict no-data acquisition policy prioritizes user privacy.

Capabilities

  • Malware Detection:
  • Identifies threats such as macro malware, VBA, VBS, PowerShell, and more.

    • Offers advanced malware simulation of files up to 1GB for evidence-based detection.
  • Data Sanitization:

    • Covers various grey areas targeted by attackers.
Information about Vortex
Listed Since: 03/07/2024
Last Updated: 03/07/2024

STAR Level 1

Self-Assessment & Partner-Provided

Consensus Assessments Initiative Questionnaire v4.0.2

CAIQ 4.0.2 Self-assessment
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the CSA Cloud Controls Matrix (CCM).