world tour:
Join us for a live look at how Menlo’s Secure Enterprise Browser puts you ahead of attackers
Icon Rounded Closed - BRIX Templates

Evaluating Internet isolation clouds: Must-have features

Menlo Security
|
November 18, 2019
linkedin logotwitter/x logofacebook logoSocial share icon via eMail

Not all Internet isolation solutions are created equal. Just ask our customers. One of them learned the hard way.

With millions of customers worldwide and trillions of dollars in assets, a leading global investment firm was a high-profile target for cybercriminals. A layered defense protected the organization against a broad variety of threats, but email phishing attacks were becoming an increasingly serious threat. Something had to be done.

To combat email threats, the organization deployed multiple layers of security. The architecture included cloud and on-premises versions of anti-spam, anti-virus, data security, encryption, and sandboxing solutions, but spearphishing attacks and drive-by malware exploits were still a significant risk. It would take only one successful attack to cause billions of dollars’ worth of damage.

Knowing that this was an unacceptable risk, the organization worked with Menlo Security to implement a Zero Trust Internet cybersecurity strategy. Today, all of the organization’s web sessions pass through the Menlo Security Internet Isolation Cloud, isolating all web traffic. When users do click on malicious links, all sites are already safely isolated and have input-field restrictions. By isolating all email links and attachments, Menlo Security Email Isolation protects the firm against credential theft, while eliminating 100 percent of drive-by malware exploits.

Here are 5 out of 10 must-have features to look for when evaluating an Internet isolation cloud, you will need to download the ebook to see the others:

Web Isolation Technology 

  • Should be designed to protect users and endpoints from all active and malicious content
  • Makes efficient use of endpoint and network resources to avoid impacting performance

Protection Against Phishing 

  • Should include and integrate email security, including automatically isolating the links and attachments from email
  • Prevents users from filling out suspicious web form

Native-Like User Experience 

  • Should have minimal impact on the user experience
  • Uses adaptive rendering to preserve as much of the native user experience as possible

Advanced Threat Protection 

  • Should assume that all content originating from the Internet is risky, including content that was previously benign
  • Provides 100 percent protection against all web- and document-borne threats, including zero-day malware

Additional Cybersecurity Features 

  • Should go beyond just isolation to provide AV, URL filtering, DLP, reporting, policy and authentication, encrypted traffic management, cloud access security broker, and email link and attachment protection

Don’t wait until your organization suffers a devastating breach or until you reach the tipping point when cybersecurity becomes cost prohibitive as a result of inefficiencies. Look for an Internet isolation cloud that has these 10 features. You won’t be sorry.