Find the right approach to browser security
Most Searched
Traditional security approaches are flawed, costly, and overwhelming for security teams. Menlo Security is different. It’s the simplest, most definitive way to secure work—making online threats irrelevant to your users and your business.
Video
Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over.
eBook
Traditional network security wasn’t built to address today’s complex enterprise environments. SASE fixes that problem.
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.
Buyer's Guide
Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise.
Menlo Security | Aug 20, 2020
Share this article
Enterprises frequently acquire an isolation solution (with Menlo for remote browser isolation) for groups of users, such as VIPs, rather than their entire workforce. While this strategy insulates VIPs from malware attacks, it assumes that only VIPs have access to potentially crippling information.
In reality, an attacker can cause massive damage using any employee’s credentials. Once access is granted, tiny slivers of information such as customer lists and SSNs could easily force ransomware payments of millions of dollars.
Everyone is vulnerable in an organization and focusing on protecting only “very attacked people” wrongly prioritizes the most visible targets.
A goal of many security professionals is to decrease the number of vulnerable users to a given threat. This goal is important during IT fire drills and active attacks, in which the time-to-response window can be short.
Knowing which threats to investigate first (or last) shortens response times. Suppose an entire organization is equipped with isolation. In that case, the risk of a successful web or email-based attack drops because the previously exposed and vulnerable parts of the network are now isolated.
Similar to herd immunity, cloud-based isolation has benefits that increase as more users are shielded.
In modeling an attack event with a network of 100 percent isolated users, the IT admin may want to alter their threat model to account for the lowered probability of a web-based phishing attack. An updated threat model would direct IT teams more toward threats not protected by isolation, such as someone taking physical control of an unlocked laptop or discovering gaps in their isolation coverage.
One major banking company noted a drastic reduction in IT-related emergencies after they adopted Menlo isolation. We helped them reduce their attack surface area by 90 percent across their entire deployment of isolated and non-isolated endpoints. The result was a 10X increase in worker productivity and an ROI of 261 percent after three years.
Menlo Security Insights, our analytics engine, enables you to discover, track, and monitor user activity during incident response.
Reports can be created on-demand or automatically sent to various stakeholders across the organization. Importantly, our threat modeling tools help IT admins observe their entire threat profile (risky users, phishing, malware, etc.) for analysis.
To learn more about Incident Response with Menlo Security Insights, consider reading our Data Sheet.
Posted by Menlo Security on Aug 20, 2020
Tagged with
Protecting the Remote Workforce
To talk to a Menlo Security expert, please complete the form.