Cyberinc CEO Samir Shah Thought Leadership On Winning The Cybersecurity Battle Against Malware: Isolation The Only Real Solution


NEW YORK, Nov. 02, 2017 (GLOBE NEWSWIRE) -- Samir Shah, CEO, Cyberinc, said, “Browsers are our window to the World Wide Web, as we access various types of browsers on a variety of smart devices, umpteen times a day. The ubiquitous web browser - the strategically important application on corporate desktops, ironically, is also the only application on the desktop that regularly downloads and executes code from both trusted and untrusted networks. To borrow an analogy from airport security, the browser, by default, does not ‘scan’ or ‘frisk’ the code that enters and executes on the endpoint. As a result, browsers which keep the business connected to the global economy, have also become the preferred channel for cybercriminals to snake their way into our devices & systems.

"Cyber hackers are exploiting the inherent vulnerabilities associated with browser code and plug-ins to launch devious cyber attacks, impacting business continuity and revenues, along with eroding consumer trust and loyalty. Multiple vulnerabilities detected across popular browsers such as Google Chrome, Thunderbird, SeaMonkey and Mozilla Firefox by cyber sleuths in India, all highlight security issues within the browser. A recent advisory issued by the Computer Emergency Response Team of India (CERT-IN) has listed key browser vulnerabilities: of how browsers could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and cause denial of service condition on the affected system.

"For enterprises of all size and shape and government institutions alike, web-based cyber attacks pose a great security challenge and concern, in times of complex strains of APTs, drive-by-downloads, polymorphic threats, and zero-day attacks launched through web browsers.

"Though organizations heavily rely on secure web gateways and, or firewalls to detect and prevent Internet-borne threats delivered through users’ browsers, they are simply not adequate. There is way too much data on users, customers, organizations and reputations at risk. Detection-based approaches are not accurate and it is inevitable that some websites are misclassified or cannot be classified. This opens the door to new malicious sites, especially since many enterprises allow access to uncategorized sites. The limitations of this technology are further compounded with ingenious ways adopted by hackers for circumventing the detection-based approach with several mechanisms used in proxies. 

"Similarly, other popular traditional detection based technologies like endpoint sandboxing, cloud-based proxies and signature-based malware scanning also have inherent limitations resulting in security compromises. This brings the focus back on how traditional network security tools that rely on outdated detection-based technologies to scan web content and decide if it is good or bad, aren’t effective in preventing the modern day attacks techniques of polymorphic threats and zero-day exploits.

Combating Malware with Isolation
"Britain's communications regulator, Ofcom recently found that adults spend an average of 20 hours/ week online, and most of that time is spent on a web browser. This statistic when combined with industry estimates of 80% malware introduced through the browser and 10 new strands of malware code released every second, highlights the urgency to devise a full-proof mechanism that can contain malware attacks emanating from the browser. So how can organizations ensure the safety of their data when it is practically served on a platter to cybercriminals?

Enter Isolation Technology
"The speed and agility with which new strains of malware are getting concocted by hackers, it is becoming near impossible for anyone specific security solution to guard against all the possible attack vectors.  It is therefore imperative to stop detecting Good code versus Malware and simply isolate all the web content assuming it is bad or malicious - and hence, a potential threat. What the industry truly needs today, is a comprehensive solution, that can isolate the web session outside the network, thus preventing any browser-borne malware from entering the network and gaining unauthorized access to sensitive information.

"This brings us to the innovative Isolation approach, based on the concept of creating an 'air-gap' between the web and users, to eliminate the possibility of threats reaching endpoint devices. It helps contain the damage by isolating end-user internet browsing sessions from enterprise endpoints and networks. By isolating the browsing function in a virtual machine, which processes all the computer code delivered from the web outside of the protected network, malware is kept off the end-user's system. The comprehensive isolation apparatus completely isolates the web browser, its extensions and plugins outside the protected network in a purpose-built, hardened system – thus introducing a new type of barrier against modern attack techniques.

Why It Works:
"With isolation, because all content is executed away from endpoints, users are completely protected from malicious websites. It provides a dual advantage to its users:

  • No code executes on the endpoint - protection from the most advanced web-borne threats by isolating all web content outside the network perimeter
  • Once an Isolation barrier is set up, even the malicious code that has previously been downloaded and is hidden in the endpoint cannot call home rendering it useless.

Isolation, the foundation of cyber resilient enterprises
"When it comes to fighting cybercrime, a preventive approach always bodes well for organizations. In today’s rapidly changing threat environment, it is imperative to have a comprehensive malware isolation approach that executes all the web code outside of the vulnerable network, thus automatically breaking the 'kill chain' of advanced sophisticated attacks.

"In an era of rapidly converged digital systems, we strongly believe that Isolation is the only way to ensure complete protection against any kind of modern web-borne malware attack. Acclaimed industry bodies like Gartner have recognized Isolation as one of the top 10 technologies to adopt in Information Security, and have predicted a rapid rise in adoption of the same. Gartner predicts that by the year 2020 up to 50% organizations would have invested in Isolation technology, up from the current five percent. With accelerated adoption and industry recognition, Isolation will lead the drive of building resilient and secure digital businesses.”

For our complete interview with Samir Shah please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html 

In other recent Cyberinc news:    

Cyberinc launches IAMobile™ App for One Identity’s Identity Manager           
https://cyberinc.com/news/cyberinc-launches-iamobile-app-for-identity-manager/
BPT Introduces Cyberinc’s ISLA® Web Malware Isolation System in Indonesia: to help prevent Web-borne Malware Attacks
https://cyberinc.com/news/bpt-introduces-cyberinc-isla-web-malware-isolation-system-in-indonesia/
Cyberinc included in “Cool Vendor” list by Gartner in Endpoint, Mobile, Network and Gateway Security, 2017
https://cyberinc.com/news/cyberinc-included-in-gartner-cool-vendor-list-2017/
Cyberinc powers expansion of Isla® into global markets: Signs partnership with Hewlett Packard Enterprise (HPE)
https://cyberinc.com/news/cyberinc-signs-partnership-with-hewlett-packard-enterprise/

About Cyberinc

Cyberinc is a subsidiary of Aurionpro and delivers advanced security solutions for enterprises. Its offerings include secure, scalable, high performance security products that protect from cyber-attacks, and services that help enterprises transition to next generation access management systems. For more information, please visit: www.cyberinc.com

About SecuritySolutionsWatch.com

SecuritySolutionsWatch.com features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco SecurityDell EMCHP CybersecurityGemaltoHID GlobalImageWareSiemens Security and SONY Security, just to name a few.

What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution?
We invite you to please join us "In The Boardroom", more details here, or here: http://www.securitysolutionswatch.com/Main/ThoughtLeadershipOpportunity_July2017.pdf

Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html
Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf  for additional details about our offerings.

*****

SecuritySolutionsWatch.com Is Proud To Be A Sponsor Of These Important Upcoming Events
MARK YOUR CALENDAR!

*****

Cyber Security Summit: Boston

Wednesday, November 8, 2017   |   7:45AM to 6:00PM   |   The Westin Copley Place, Boston

https://cybersummitusa.com/2017-boston/

*****

Border Management & Technologies Summit Asia 2017
Kuala Lumpur, Malaysia

November 7, 2017

Asian nations are continuing to develop their borders and create the most efficient immigration processes at airports. Many of the regions border security agencies are working hard to improve security on their borders from illegal migration to cross-border organised crimes. Airports in the region are improving passenger experiences to make immigration processes as smooth and hassle free as possible.   Read More >>

To take part in our international event either as a speaker, sponsor, exhibitor or as a delegate please contact us at events@intelligence-sec.com or call us on +44 (0)1582 346 706

*****

The 6th Regional Cybersecurity Summit

20th – 21st November, 2017

Sheraton Hotel, Oman

*****

TRUSTECH

28-30 NOVEMBER, 2017

PALAIS DES FESTIVALS CANNES

FRENCH RIVIERA

Following a brilliant first edition in Cannes last year, TRUSTECH Pay, Identify, Connect & Secure – will bring together once again the entire payments and identification ecosystem in the Palais des Festivals de Cannes, 28th to 30th November, 2017.

The event was first held over thirty years ago under the name «Cartes Secure Connexions», to promote the newborn technology of smartcards. In 2016, it is re-named TRUSTECH to better reflect the way the industry and the event have evolved, and its focus on trust-based technologies.

More than ever, this event is a unique opportunity to meet the whole ecosystem and get an insight into the latest innovations in payments and identification industries.

350+ exhibitors and sponsors are expected – either to present their latest innovations on their stand or to pitch on the Innovation Stage. Among those who have already confirmed their participation: Be2bill, Dermalog, Ingenico, Matica, NBS Technologies, Next Biometrics, NXP.

Semiconductors, Otto Kuennecke, Spire Payments, ST Microelectronics, Thales E-Security, Verifone, … and many more!

About COMEXPOSIUM: The COMEXPOSIUM Group, one of the world’s leading event organizers, is involved in more than 170 B2C and B2B events across 11 different sectors, including food, agriculture, fashion, security,digital, construction, high-tech, optics and transport. Comexposium hosts more than 3 million visitors and 45,000 exhibitors in 26 countries around the world. Comexposium operates across 30+ global economic growth zones,such as: Algeria, Argentina, Australia, Belgium, Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan, Korea, Monaco, Netherlands, New Zealand, Philippines, Qatar, Russia, Singapore, Spain, Thailand,Turkey, UAE, UK, USA.

*****

Cyber Security Summit: Los Angeles

Wednesday, November 29, 2017   |   7:45AM to 6:00PM   |   The Beverly Hilton

https://cybersummitusa.com/2017-losangeles/

*****

TEC 2018
March 12-16, 2018
Sheraton Downtown Denver
Denver, CO

TEC, presented by PSA Security Network, is the premier education and networking event for all professional systems integrators. TEC features industry leading education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

TEC 2018 will be held at the Sheraton Downtown Denver in Denver, CO on March 12-16, 2018. The education program will deliver sessions focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge base needed to continue to drive the industry forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.

*****
Joint 2018 Payments Summit / ICMA Expo and U.S. Payments Forum Meeting
March 26-29, 2018
Omni Orlando Resort at ChampionsGate, Championsgate, FL

*****
LAAD Security 2018 | Apr 10-12, 2018 | São Paulo-SP| www.laadsecurity.com.br

*****
Securing Federal Identity 2018
June 5-6, 2018
Almas Conference Center
1315 K Street, NW, Washington, District of Columbia 20005

*****

LAAD Defence & Security 2019 | Apr 02-05, 2019 | Rio de Janeiro-RJ | www.laadexpo.com.br

****

FOR MORE CONTENT ABOUT SECURITY THREATS AND SOLUTIONS...
...PLEASE 
CLICK HERE FOR OUR MONTHLY NEWLETTER 
(
http://securitysolutionswatch.com/newsletters/newsletter_2017_10.html)
 And
 PLEASE VISIT US ON TWITTER 
HEREhttps://twitter.com/SecStockWatch

*****

THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html.


            

Contact Data