Thorncastle
The distributor of the full suite of Blue Ridge Network solutions in Canada
Awards
Prevent all known and unknown attacks
AppGuard’s policy enforcement engine prevents viruses, fileless malware, botnets, polymorphic malware, weaponized documents, targeted attacks, in-memory attacks, ransomware, phishing, watering-holes, drive-by-downloads, and other undetectable advanced threats.
AppGuard doesn’t rely on scanning known signatures or patterns to identify good from bad files. The AppGuard lightweight agent sits low at the kernel level and blocks unacceptable actions like code injection, or writing to the registry at the process level.
Protect your critical assets and end cyber attacks
Using a Zero Trust stealth overlay, LinkGuard seamlessly conceals your network, reduces your attack surface, and prevents hackers from gaining access to your critical assets while extending trusted communications and connectivity with a granular level of control.
LinkGuard prevents external network breaches with a solution that is simple to implement, easy to deploy, and doesn’t force your organization to constantly react to cyber threats. Even the most complex systems can be up and running in minutes — with no augmentation of your existing system structure.
Secure your mobile networks
Centrally managed by the BorderGuard Management console, EdgeGuard clients address the needs of an ever-increasing mobile workforce by enabling secure remote access for telework, management, or monitoring while simultaneiously protecting the enterprise from potential malicious code on the user’s computer and preventing the export of internal/private information by that computer.
EdgeGuard provides the user with a virtual desktop that can be configured with a web browser, VDI solutions from Microsoft, VMware, Remote Desktop to the user’s corporate desktop, or a Terminal Server, and Citrix. EdgeGuard is compatible with most VPNs, VDI environments, user authentication methods, SSL platforms, and other system architecture components without disruption to existing network infrastructure or operational processes. corporate offices, turning any device (including personal devices) into a trusted terminal.