Internet browsers have turn into the most deliberately vital app for business, however they also signify the browser most vulnerable to attack; web browsers are regularly allowed to download application code from obscure sources and completely render it within a safe network.
Looking to address this issue, a cyber-security firm named ‘Spikes Security’ has presented the Isla family of internet malware isolation machines, which prepare all internet content on safe machines sent outside the system. There, the web content stays in VMs made for every client session. All internet content—sound, text, video, and design — is then conveyed to end user applications.
This implies that client action, including mobile devices and tablets, that utilized to bypass corporate privacy can now go through Isla machines situated outside the firewall.
Quocirca’s director and analyst, Bob Tarzey said, “Virtually every enterprise includes mobile as a key work platform, and…cyber-threats don’t respect the traditional security boundaries that enterprises typically rely upon. It’s essential to prevent lateral threat movement from mobile across the enterprise.”
Ponemon Institute conducted a research in 2015 which exposed that utilizing internet browsers cost companies almost 5.62 million dollars per annum – a total that contains the collective costs connected with prevention, detection, remediation and forensics of cyber-attacks directly associated to anonymous browser borne bug.
CEO of Spikes Security, Branden Spikes explained, “Isla is the result of over two years of intense engineering effort to build an enterprise-class solution that is fast, convenient, and powerful, yet makes no compromises on security.”
He added, “Based on early response from customers, we expect Isla to be broadly adopted and designed into enterprise network security architectures. It solves a massive security problem that has plagued organizations for years.”
Isla offers apparent integrations with all up-to-date web browsers, such as Safari, FireFox, Chrome, Microsoft Edge and Explorer, however you can select the Isla client viewer, which can switch commercial internet browsers in full proof security companies that favor not to consume browsers on endpoint systems at all.
Many malwares are delivered via internet activity, either way, surfing defected websites or clicking on faulty and malicious links inserted in emails. The malware sophistication increase makes it difficult to detect utilizing conservative signature based methods.
ESG’s (Enterprise Strategy Group) senior analyst, Jon Oltsik said, “There are multiple examples of security breaches due to browser-borne malware over the last six months, so organizations really need to take a ‘big picture’ look at solutions to address these breaches. ESG research indicates that cybersecurity professionals may be open to a new approach; one that offers a secure, scalable, and high performance solution that can empower businesses with the freedom to safely use the web without fear of cyber-attacks.”
Latest posts by Lawrence Mwangi (see all)
- Trust.Zone VPN – Is it really worth using? Yes, for me - 8 July 2015 12:01 PM
- Spikes starts browser malware isolation - 1 July 2015 1:02 PM
- Guide to Secure Your Instagram Account - 27 March 2015 7:52 AM