You may have seen that Gartner has recently identified Remote Browsing/Isolation as one of its top 10 security technologies for 2016. With our previously announced partnership with Check Point, Menlo Security makes it simple to add this game-changing technology to an existing Check Point solution to eliminate malware and risky Web content.
Why Add Isolation?
With one-fifth of the world’s top 1 million web sites known to be running outdated and vulnerable software, it’s inevitable that end users are at risk.
The Menlo Security Isolation Platform (MSIP) uses patent-pending Adaptive Clientless Rendering™ (ACR) technology to deliver a malware-free rendering of the user's isolated session to their native browser, providing a safe and transparent user experience.
How does it work?
Menlo Security’s Isolation Platform executes sessions away from endpoints and delivers only safely rendered content to devices, working seamlessly with your firewall. Check Point's security gateways can selectively steer network traffic to Menlo Security's Isolation Platform based on policy controls. The integration is executed at the network layer enabling isolation security without the need to deploy additional hardware or endpoint software agents. This solution brief explains further.
New to Isolation Technology?
In a recent webinar, Gartner pointed out that isolation is an essential part of an IT security threat prevention strategy, identifying key criteria for selecting an isolation vendor. Just last week, they selected Remote Browsing/Isolation in their Top 10 Technologies for Information Security in 2016 announcement, in which they describe the emerging approach of content isolation.
Next Steps – Check it Out
A cloud-based option for isolation eliminates the hassles of hardware procurement, installation, configuration, and maintenance. Most importantly, it delivers a high fidelity end user experience while protecting your organization from malware and ransomware. Contact us to to see how we can enable an Isolation trial in your environment or view more resources.
For more information, visit www.menlosecurity.com.