Articles, trends, and advice on cloud security without compromise. Keep up with the latest blog insights on web isolation, network cybersecurity, malware, and more.

Security That's Imperceptible - Gartner's Take on Choosing the Right Isolation Provider

isolation_tree.pngWith Web and email continuing as primary malware vectors, companies are increasingly adopting isolation technology to contain and prevent risky content. However, Gartner points out that an isolation solution must deliver a high-quality end user experience to keep up with enterprise productivity needs.

This Menlo Security webinar, featuring Gartner, recommends you ensure your isolation technology solution provides a positive user experience, especially full fidelity and rich media support. If a solution reduces performance, your employees will find a way to work around your security measures, defeating your entire purpose of eliminating malware. 

Ensure a Positive User Experience

Be careful to evaluate your isolation solution and avoid those that inadvertently introduce:
  • Page scrolling and performance latency
  • Jittery streaming content
  • Disabled copy and paste functions
  • Hard to deploy/support endpoint software

Learn more about modern isolation technology from Gartner Analyst Neil MacDonald in our webinar, which also discusses how isolation fits into your advanced threat protection strategy.

What I think is especially helpful in the webinar is the criteria set that Gartner recommends as you select an isolation provider. I’m paraphrasing, but the main criteria include:

  1. Ensure a positive user experience. The user should never see a difference in Web behavior.
  2. Avoid changing browsers on your employees.
    The user should not have to do anything differently, or use a different browser.
  3. Enable choice. Use the local browser for your white listed internal web apps and use isolation for public Internet sites.
  4. Avoid hardware and licensing requirements. You’ll want a solution using containers, so it doesn’t have to use complete virtual machines that require a license.
  5. Make it simple to deploy. Avoid having to use separate browsers or any agents. More on this is covered in the webinar.
  6. Provide options for a cloud-based solution. Run it as a managed service option, like browser-as-a-service.
  7. Support rich media. Not all vendors can support rich media, like YouTube.
  8. Enable white listing to support microphones and video cameras.  Provide local access to the microphone or video camera for conferencing sites like WebEx.
  9. Provide a strategy for downloading content. The public Internet will have content you want to download, whether an executable, PDF, Word file, or a presentation file. Your isolation vendor needs to help support your strategy.
  10. Restore back to a known state. Containers should be discarded after every session so malware has no ability to persist on that isolation platform.

If you are considering implementing an isolation approach, choose a solution that delivers your end users a safe and productive working experience. Our approach at Menlo Security is to place positive user experience on par with user protection, while limiting complaint calls into your security team. Watch our informative webinar featuring Gartner, or check our Menlo Security case studies and resources to learn more. 

Tags: malware, vulnerability, isolation, security, webinar, top-sites

Connect with us

Lists by Topic

see all

Recent Posts