Conceal Network from Browser-borne Attacks

Conceal Network from Browser-borne Attacks

By Greg Tavarez

Nonstop internet use is vital in everyday operations, but that creates cybersecurity risks when care is not taken. All it takes is clicking on the wrong link in an email and information is revealed about the organization and its attack surface. Or, downloading a suspicious file with no hesitation creates an open path for ransomware groups to come through.

To avoid paying more than $1 million in recovery costs or losing 2TB of data – the cost of a breach today according to the Dell Global Data Protection Index – organizations need a line of defense. Conceal provides that line of defense with ConcealBrowse, now available on the Google Chrome store.

ConcealBrowse performs pre- and post-processing of code on a computer to protect against browser-borne attacks including RATs, trojans, ransomware and browser hijacking. The platform allows known good URLs to continue their normal path or route the activity through Conceal’s dynamic software-defined network and isolation environments to remove context and provide extra layers of privacy and security to users and enterprises.

ConcealBrowse makes proactive decisions about the security risk associated with internet use and automatically isolates risky transactions — seamlessly without user interruption. Browsing activity takes place in Conceal’s isolated environment, ensuring that any malicious codes or files never execute on enterprise devices.

ConcealBrowse works with existing browsers and supports all popular operating systems. It also integrates with Microsoft Azure Active Directory and Okta for single sign-on authentication. Additionally, ConcealBrowse offers an opportunity for the security partner community to provide innovative solutions to their customers.

Being a drop-in solution that is easily added to existing security packages, it requires minimal configuration and provides advanced telemetry data that is integrated with SIEMs and common analytical tools via integrations with Splunk and Elasticsearch. Telemetry can also be consumed in a multitude of applications via a Syslog plugin.

“The proven success of our platform is enabling Conceal to embark on an aggressive global growth strategy,” said Gordon Lawson, CEO of Conceal. “We’re not only introducing the extension, but are also increasing overall accessibility to our growing global MSP/MSSP partner community.”

For organizations that want to beef up their cybersecurity posture, look at ConcealBrowse to ensure malicious codes or files never enter enterprises devices and remove the risk of them infiltrating the network.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

MSPToday Editor

SHARE THIS ARTICLE
Related Articles

Say Goodbye to Passwords: 1Password Unveils Two Passkey Innovations

By: Greg Tavarez    6/9/2023

1Password now offers customers the ability to save and sign into online accounts with passkeys as well as unlocking 1Password accounts with a passkey.

Read More

Industrial Cybersecurity Transformed: Secureworks Launches Integrated MDR Solution for OT and IT

By: Greg Tavarez    6/8/2023

Secureworks announced two new offerings to unify the way industrial organizations prevent, detect and respond to threats across the OT and IT landscap…

Read More

K8 Notifier: A New Twist on Cloud Cybersecurity

By: Matthew Vulpis    6/8/2023

K8 Notifer can create a suite of alerts for MSP to detect suspicious activity in the configuration and patterns of their and their customers cloud ser…

Read More

Impossible Cloud Paves Way with New Program in the Web3 Era

By: Greg Tavarez    6/8/2023

Impossible Cloud's Partner Program allows partners and resellers to seamlessly implement, demo and integrate its efficient, performance-driven solutio…

Read More

CrowdStrike Empowers Next-Gen Cybersecurity with Generative AI

By: Stefania Viscusi    6/8/2023

Security company CrowdStrike unveiled Charlotte AI, a new generative AI cybersecurity that will help to democratize security and empower users of the …

Read More