Cyber Defense eMagazine December 2019
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
46<br />
It’s a basic fact of contemporary life that the internet is not safe. In fact, the internet is a critical part of the<br />
delivery chain for most threats. Zero Trust supporters address this fact by recommending that known<br />
secure sites be whitelisted and access denied to all other sites. This is, however, highly impractical for<br />
most businesses, which rely on the internet for many essential business tasks. Limiting access reduces<br />
productivity, leaves employees frustrated and increases workloads for IT staff, who must divert attention<br />
from critical tasks to manage access requests. Users are forced to wait for IT approval and intervention<br />
in order to complete their tasks.<br />
When it comes to browsing, Zero Trust security must ensure that no site can interact with vulnerable<br />
endpoint browsers and through them, organizational networks. One method of implementing Zero Trust<br />
browsing that is rapidly gaining traction is remote browser isolation (RBI), which sequesters all direct<br />
interaction with websites in virtual browsers located remote from endpoints.<br />
When a user opens a browser or tab, a virtual browser is spun up within a container in the cloud. All direct<br />
contact with websites and applications occurs within that container - no content reaches the end-user’s<br />
device. A safe media stream is sent from the remote browser to the user’s endpoint browser, allowing<br />
them to interact naturally with the site. Some RBI solutions also sanitize downloads through a content<br />
disarm and reconstruction process before releasing them to the endpoint. When the user stops browsing,<br />
the container along with all content from the browsed site is destroyed.<br />
RBI protects government agencies from users’ erroneous clicks on phishing emails by opening linked<br />
sites in the remote container. In addition, some solutions address credential theft by blocking known<br />
malicious sites and opening suspicious sites in read-only mode.<br />
Public sector organizations are on track to embrace the Zero Trust paradigm. Until that happens,<br />
however, their security situation will continue to be challenging and complex. Zero Trust Browsing using<br />
RBI provides a practical path to rapidly reduce threats and realize both security and productivity when it<br />
comes to threats delivered via the web.<br />
About the Author<br />
Gerry Grealish is the Chief Marketing Officer at Ericom, where he is responsible<br />
the company’s outbound marketing and business development activities. He is a<br />
security industry veteran, with over 20 years of Marketing and product experience<br />
in cybersecurity and related technologies. In addition to his work at Ericom, Gerry<br />
is a frequent contributor to cybersecurity dialogue in areas such as Zero Trust<br />
Security, Cloud Access Security Brokers (CASB), and Web/Cloud Security.<br />
Connect with Gerry on LinkedIn.