02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

46<br />

It’s a basic fact of contemporary life that the internet is not safe. In fact, the internet is a critical part of the<br />

delivery chain for most threats. Zero Trust supporters address this fact by recommending that known<br />

secure sites be whitelisted and access denied to all other sites. This is, however, highly impractical for<br />

most businesses, which rely on the internet for many essential business tasks. Limiting access reduces<br />

productivity, leaves employees frustrated and increases workloads for IT staff, who must divert attention<br />

from critical tasks to manage access requests. Users are forced to wait for IT approval and intervention<br />

in order to complete their tasks.<br />

When it comes to browsing, Zero Trust security must ensure that no site can interact with vulnerable<br />

endpoint browsers and through them, organizational networks. One method of implementing Zero Trust<br />

browsing that is rapidly gaining traction is remote browser isolation (RBI), which sequesters all direct<br />

interaction with websites in virtual browsers located remote from endpoints.<br />

When a user opens a browser or tab, a virtual browser is spun up within a container in the cloud. All direct<br />

contact with websites and applications occurs within that container - no content reaches the end-user’s<br />

device. A safe media stream is sent from the remote browser to the user’s endpoint browser, allowing<br />

them to interact naturally with the site. Some RBI solutions also sanitize downloads through a content<br />

disarm and reconstruction process before releasing them to the endpoint. When the user stops browsing,<br />

the container along with all content from the browsed site is destroyed.<br />

RBI protects government agencies from users’ erroneous clicks on phishing emails by opening linked<br />

sites in the remote container. In addition, some solutions address credential theft by blocking known<br />

malicious sites and opening suspicious sites in read-only mode.<br />

Public sector organizations are on track to embrace the Zero Trust paradigm. Until that happens,<br />

however, their security situation will continue to be challenging and complex. Zero Trust Browsing using<br />

RBI provides a practical path to rapidly reduce threats and realize both security and productivity when it<br />

comes to threats delivered via the web.<br />

About the Author<br />

Gerry Grealish is the Chief Marketing Officer at Ericom, where he is responsible<br />

the company’s outbound marketing and business development activities. He is a<br />

security industry veteran, with over 20 years of Marketing and product experience<br />

in cybersecurity and related technologies. In addition to his work at Ericom, Gerry<br />

is a frequent contributor to cybersecurity dialogue in areas such as Zero Trust<br />

Security, Cloud Access Security Brokers (CASB), and Web/Cloud Security.<br />

Connect with Gerry on LinkedIn.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!