Isolate all untrusted content - contain malware in an airlock.
How it Works
Adversaries have outpaced legacy preventative solutions – but we can fight back with new approaches.
With the headlines showing us a steady stream of major breaches it can be easy to think that prevention is a failed strategy. At Invincea, we recognize that prevention has been failing but refuse to surrender to the bad guys and accept a defeatist mentality. We believe that prevention is possible if we continually evolve our techniques to outpace those of our adversaries…and that’s what we believe we’ve done with the Invincea breach prevention platform.
The Core Philosophy:
The users are the primary target of the adversary – they’ve become the unwitting accomplices to breach and are the root cause of the vast majority of breaches today. So let’s find a way to protect the network from the user and the user from him or herself.
Protect the network from the user and the user from him or herself
By segregating the untrusted content users come in contact with from the operating systems that run the untrusted content, we can protect the network.
The implementation is straight forward – anytime a user interacts with content from the Internet, whether in a browser, email attachment, or application that renders content from the Internet, virtualize the application and content the user interacts with in a secure virtual environment.
If the content is malicious it infects a disposable environment, not the desktop. If the user makes a poor decision, the consequences of that decision are instantly reversed with no damage to the system or loss of data.
By moving away from signature-based detection to a focus on behavioral and heuristics-based detection, we can stop zero-days in their tracks.
In fact, the distinction between zero-days and known attacks goes away, making the term zero-day quaint. By putting our adversaries in a virtual airlock every time a user clicks on a malicious link or attachment, we can capture forensic detail related to the intent of the adversary – making pre-breach analysis possible and lessening the need for expensive post-breach response.
Prevention and Intelligence:
The new prevention reality is more than imaginable – it’s here now. Today your adversaries are collecting intel on you while you try and find them. Tomorrow you could be collecting intel on your adversaries as they show their exploits in virtual fishbowls with each user interaction. Today, your users are your liabilities as they infect your network by doing what users do – clicking on links and opening attachments. Tomorrow, your users could be your security deputies – providing you with pre-breach forensic details on every exploit that you can use to block adversaries at the network perimeter.
With Invincea, you have the power to look your adversaries in the face and let them know you mean business about fighting back. You can prevent the breach, not just report on the crime.
The question is – will you?