V2 Web Threat Protection 2020-02-16-1
Total Page:16
File Type:pdf, Size:1020Kb
Datasheet Web Web Threat Protection All external code is intercepted Ensuring browser security is more important than ever because the and transformed into harmless largest exposed attack surface in most organizations is comprised of pixels before it has a chance to attacks coming from the internet, resulting in an estimated 98% of all touch the endpoint. endpoint compromises.¹ Almost all successful attacks on users originate from the public internet and many involve web-based attacks.² Using a Web Apps Zero Trust model, Isla isolates all code coming through your web browser and neutralizes threats without the need for detection or compromising Web Apps containing sensitive productivity. Your users can do everything they did, but now their information are secured within endpoint is proactively protected, and your attack surface is Isla preventing compromised dramatically reduced. applications from gaining access to your endpoint. Web-based Attacks Isla Web Protection With most cyber-attacks coming from your Remote Fetch, Isla fetches, executes, and renders all browser, ensuring its security is more Execute, & Render content away from the endpoint ensuring no important than ever. Using a Zero Trust external code touches your device model, Isla isolates all code, media, and scripts coming through your web browser Disposable Virtual Every user is isolated in a disposable remote Environment environment to ensure no threat and neutralizes threats without the need propagation within shared environments for detection or compromising productivity. Your users can do everything they did Credential Theft Safe Surf renders suspicious pages in a before but now their endpoint is Protection read-only mode to protect end users from safeguarded, and your attack surface is unintentionally compromising their credentials dramatically reduced. or risk losing other valuable information Malvertizing, Isolate web-borne attacks and prevent Ransomware, & breaches. When your users visit a page, Isla Cryptomining remotely fetches, executes, and renders the Protection information keeping your users safe Drive-by Download Drive-by downloads are eliminated by Protection remote rendering techniques used by Isla’s complete web isolation Zero-day Attack Isla doesn’t sift or scour for threats instead Protection adopts a Zero Trust model. Known attacks or zero-day attacks are stopped equally effectively www.cyberinc.com © 2020, Cyberinc. Datasheet | 02 Isla moves the trust away How Isla works 2 Users experience 4 from the endpoint and seamless and secure performs fetch, execute, and browsing without render functionalities remotely compromise HTML 5 WEB APPS JS DOC I S L A SWF EMAIL PDF Isla transforms 1 The Internet is the 3 #1 threat vector, sending all code and content unchecked active code into a visual stream of to your users harmless pixels Web App Vulnerabilities Isla Web App Protection Breaches Isla prevents breaches coming from attacks Web Applications enhance business within compromised web applications processes but come with threats and vulnerabilities. Isla secures web apps Protection from Isla isolates compromised web applications, preventing compromised applications Compromised Web safeguarding your endpoints and organizations from gaining access to your endpoint. Applications against attack proliferation Risk Reduction Reduce your attack surface by 70% by eliminating major threat vectors Integrated Proxy Isla Secure Web Gateway Protect your users while minimizing The Isla Platform can easily be deployed with your existing Secure Web any changes to the endpoint with an Gateways and augments the SWG by isolating selected sites to ensure agentless solution. Redirect all traffic additional security. Isla also offers basic SWG functionality, that allows to the internet via the Isla proxy to you to set policy-based controls based on URL classification for an ensure your user sessions are always added level of protection while also enabling enforcement of acceptable safe. Augment your existing proxy with use policies. The customizable solution allows for individual, group and Zero Trust isolation via proxy chaining organization-level policy restrictions to be put in place. Working in or leverage the Isla proxy capabilities tandem within the Isla Isolation Platform, the URL filtering capability lets to ensure your user sessions are you set browsing controls while isolation enables your users to stay always safe. productive and protected from threats. 1 "It's Time to Isolate Your Users From the Internet Cesspool With Remote Browsing", Neil MacDonald, Gartner, 2016. ² "Innovation Insight for Remote Browser Isolation", Neil MacDonald, Gartner, 2018. About Cyberinc Contact us Cyberinc helps you experience a safer Internet by proactively stopping web, email, +1-925-242-0777 and document-based threats. Cyberinc’s Isla platform uses cutting-edge isolation [email protected] technology to neutralize threats and prevent them before they have a chance to act, simplifying the security strategy and delivering immediate protection. Cyberinc is trusted by businesses of all sizes and governments around the world. www.cyberinc.com 2020.02.11.1 © 2020, Cyberinc..