Page 33 - Cyber Warnings August 2017
P. 33
How It Works
Working in conjunction with existing IT policies, secure browsing is executed inside a one-time,
disposable container in a remote “safe zone,” ensuring any potential malware is fully contained
and disarmed in a demilitarized zone (DMZ) – never making its way to the device or network.
While the virtual browser is deployed in an isolated environment outside of the network, there is
no performance degradation or latency. Once the browsing session is exited, it is discarded and
there is a browsing session allocated for every tab.
Unlike threat detection and remediation solutions, secure browsing is transparent to users –
Web-based applications can be accessed, and browsing the Internet as part of common
business practice is seamless.
IT Game-Changer
With secure browsing environments, enterprises mitigate the risk of unpatched endpoint devices,
applications and browsers. By deploying a remote virtual browser in which all web sessions are
executed, and then flattened and rendered to users as a safe, visual stream, IT can ensure that all
browsing is performed securely across the enterprise, independent of the type and version of browser
deployed on the endpoint.
Secure browsing offers a proactive approach to web security by intercepting cyberthreats, whether
known or unknown, before they can infect an endpoint device or network. This also gives IT the
flexibility to deploy browser-based applications and services that can be accessed via an array
of devices, while eliminating the "human factor" that often triggers Internet-borne threats.
Given the deluge of malware and ransomware that plague enterprises every day, secure remote
browsing offers a new approach to dramatically reduce the attack surface, while giving users the
flexibility to perform business-critical tasks via the web.
About The Author
Joshua Behar is the President and CEO of Ericom Software, a provider
of enterprise-grade secure remote access, desktop virtualization, and
web security solutions.
He has more than 25 years of experience focused on sales, operations,
management, and consulting.
Joshua holds a BA in Economics from UCLA and an MBA in Marketing
from Bar-Ilan University.
33 Cyber Warnings E-Magazine – August 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.