ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.Extract from article by Scott Petry
Reduced complexity, increased security, and perfect insulation — those are the outcomes reported by organizations who deployed a remote browser to protect their users when they access the web.
Regular browsers fetch and process all code from the web on the local computer. Inherent security vulnerabilities make the local browser the main gateway for malware infiltration (such as ransomware attacks) and data exfiltration (e.g. the Panama Papers).
Silo, the secure remote browser, renders all web content offsite in a secure container in the cloud. Only display information (pixels) is transmitted back to the user through an encrypted connection. No code (good or bad) ever touches the endpoint. That means Silo users get the same rich web experience they have come to expect from their browser, while enjoying complete insulation from all web-borne threats.
Where enterprise apps and network resources are centrally managed and protected via the cloud, the result is reduced costs, less complexity and more reliable protection of the connected endpoints. The browser is no exception to this rule. A browser isolation approach where all web code (even rendering documents like PDFs and office files) executes outside of the corporate network and off the user’s device, guarantees that web-borne ransomware and related exploits are effectively neutered.
In many recent data breaches and ransomware attacks (e.g. WannaCry and NotPetya), IT’s slower patch and upgrade cycle would not have put the enterprise at risk if the initial exploit had not been able to take root. With a centrally managed remote browser, the responsibility to keep resources current and patched shifts to the vendor whose business depends on doing this right.
For our customers, moving to the cloud delivered cost efficiency, increased IT leverage, and provably better security. Outsource your web attack surface to free up IT resources for other critical tasks and to head off the next ransomware attack. Remove the gateway through which most malware infiltrates the enterprise: the local browser.
To learn more about remote browsers and how they are protecting a growing number of law firms around the world, visit the Authentic8 booth at ILTACON or visit info.authentic8.com/legal.
Read more on Authentic8, Silo, and Remote Browsing
Additional Reading: