Page 33 - Cyber Warnings August 2017
P. 33

How It Works
               Working in conjunction with existing IT policies, secure browsing is executed inside a one-time,
               disposable container in a remote “safe zone,” ensuring any potential malware is fully contained
               and disarmed in a demilitarized zone (DMZ) – never making its way to the device or network.

               While the virtual browser is deployed in an isolated environment outside of the network, there is
               no performance degradation or latency. Once the browsing session is exited, it is discarded and
               there is a browsing session allocated for every tab.

               Unlike threat detection and remediation solutions, secure browsing is transparent to users –
               Web-based applications can be accessed, and browsing the Internet as part of common
               business practice is seamless.

               IT Game-Changer

               With secure browsing environments, enterprises mitigate the risk of unpatched endpoint devices,
               applications and browsers. By deploying a remote virtual browser in which all web sessions are
               executed, and then flattened and rendered to users as a safe, visual stream, IT can ensure that all
               browsing is performed securely across the enterprise, independent of the type and version of browser
               deployed on the endpoint.


               Secure browsing offers a proactive approach to web security by intercepting cyberthreats, whether
               known or unknown, before they can infect an endpoint device or network. This also gives IT the
               flexibility to deploy browser-based applications and services that can be accessed via an array
               of devices, while eliminating the "human factor" that often triggers Internet-borne threats.

               Given the deluge of malware and ransomware that plague enterprises every day, secure remote
               browsing offers a new approach to dramatically reduce the attack surface, while giving users the
               flexibility to perform business-critical tasks via the web.

               About The Author

                                       Joshua Behar is the President and CEO of Ericom Software, a provider
                                       of enterprise-grade secure remote access, desktop virtualization, and
                                       web security solutions.

                                       He has more than 25 years of experience focused on sales, operations,
                                       management, and consulting.
                                       Joshua holds a BA in Economics from UCLA and an MBA in Marketing
                                       from Bar-Ilan University.









                    33   Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   28   29   30   31   32   33   34   35   36   37   38