Bitdefender has announced availability of Bitdefender Browser Isolation, which creates a virtual air-gap between end-user systems and the web, ensuring attackers cannot gain a foothold or escape the execution environment of virtualised browsers.
Expressly designed to enable access to web resources without impacting end-user experience, Bitdefender Browser Isolation secures the greatest risk to networks, web browsers.
Examples of critical use-cases of secure remote browser isolation include high-risk users such as employees in HR and finance; untrusted resources; and legacy applications. The key is to secure browsers which are completely removed from end-user systems, preventing virtual machine escape attacks.
Most security technologies look for known-good or known-bad, which means only a limited number of threats can be found.
Bitdefender Browser Isolation defeats attacks by monitoring memory for attack techniques including buffer overflows, code injection, and heap spray, which are used to gain an initial foothold on systems, including in file-less attacks.
“Now that browser isolation is a proven security measure, it’s incumbent on companies to offer best in breed security along with improved user experience,” said Gavin Hill, vice president, data centre and network security products at Bitdefender.
“It’s critical that the needed air-gap between systems and internet resources is established, while providing users with the speed and access they require.”
“If users find their browser isolation technology cumbersome, it could be disabled or replaced with a less secure solution. The key to addressing this is deployment of a solution with a long history in virtualised browser like the one from Citrix.”
The security employed by Bitdefender Browser Isolation leverages unique capabilities of Citrix Hypervisor.
Only Bitdefender takes advantage of this security approach, known as Bitdefender Hypervisor Introspection, to monitor the raw memory of running Citrix Virtual Apps servers, including web browsers hosted on the servers.
The security requires no footprint in protected Virtual Apps servers to identify attack techniques used to exploit both known and unknown vulnerabilities in web browsers and their associated plugins.