Loading...
Content: all pages

 

A new Isolation Service for web applications of any kind

Prevent web attacks by letting users interact with a virtual web application stream. The complete web session incl. all client-side code is executed on trusted web browsing engines, hackers stay out.

Cyberwall means high security, high usability, and flexible scaling

ISOLATE ANY APPLICATION

Cyberwall supports almost all web technologies, functionalities and traffic volumes. Most attack vectors are simply disabled. 

PROTECT OUTDATED APPS

Cyberwall protects outdated web applications including all backend servers and APIs. It streams legacy applications without code adjustments or server updates.

CUSTOMIZE APPLICATIONS

Cyberwall can adjust web applications on-the-fly, i.e. it can change content, language and functionalities depending on region- or customer-specific requirements.

INSTANT SSL INTEGRATED

Cyberwall can deliver your web application including all third party sources via HTTPS. No adjustments needed.

The Cyberwall Isolation Service represents a new class of web security

With Cyberwall, websites can't be attacked directly - end-user can only interact with a super lightweight HTML5 stream requiring no installation. The Cyberwall between web application and end-user renders the entire website in a dedicated browsing engine. JavaScript code, REST endpoints, back-end and application servers remain completely invisible to the end-user in this setup.

Websites can‘t be protected easily, because there is a virtually infinite number of ways to attack them

Alt

PROBLEM 1

Modern Web Applications consist of many attackable resources

PROBLEM 2

There are very many ways to attack each resource or server

PROBLEM 3

Attackers can easily analyze website code and other page resources

Modern web applications consist of a variety of different HTML5 elements. JavaScript, dynamic data loading (AJAX) and complex web architectures with external parties involved open many different potential attack vectors against web applications, involved servers and databases.

Cyberwall solves the fundamental problem of website security, users interact with a virtual stream of an application

Alt

Immediate protection through isolation

 

Turnkey solution: Free of adjustments to security rules and protected application

Alt

IT operations minimally impacted

Cyberwall produces no False Positives, thus no analysis thereof is required. Also, Cyberwall supports even complex applications without adjustments to the application itself. Therefore, the protected applications can as well be changed over time without the need of adjustments to Cyberwall. Cyberwall operates transparently to end users, and is mainly effortless for web application administrators.

Fast time to value

Cyberwall can be deployed fast, whether it is on-premise, via our SaaS offering or as hybrid cloud solution. You choose the speed. The roll-out can be undertaken step-by-step, by increasing traffic secured via Cyberwall over time. Additional web applications used throughout your network can be added to the Cyberwall-protection over time and seamlessly. Depending on the requirements, we partner with local service providers to maintain larger deployments.

Supports all modern browsers, desktop and mobile devices

The technology supports all common, modern web browsers (Chrome, Firefox, Microsoft Edge, Safari and Opera) on desktops as well as mobile devices. Cyberwall supports even complex, dynamic web applications and is transparent to normal users - unless they are trying to analyse the applications source code.

Reduced bandwidth & traffic compression

Depending on the protected application and its content, Cyberwall reduces the consumed bandwidth by up to 50% in a typical setup. Also, Cyberwall delivers web applications as single source to the end user. This can result in an acceleration of the website because less connections are established between web user and web servers. Furthermore HTTP pipelining and compression techniques are used to accelerate web delivery.

Seamless transition from testing to production environments

Cyberwall can be implemented easily and activated for lab testing and demo environments of a specific application. It is not necessary to set up complex rules, systems or adjustments to the application. Development and security teams, involved parties can test Cyberwall and validate functionality of the respective application behind Cyberwall - before transition to production. The step from testing environments to production is simple as well: DNS configuration, proxy servers of HTTP-redirects can be used to route live traffic via Cyberwall.

Significant cost benefits and minimal upfront investment

In comparison to complex detection engines using a rule-based approach and requiring constant maintenance to be reasonably secure (like WAFs), Cyberwall is a leight-weight solution. It takes out the complexity of threat landscapes, saving security teams valuable time and resources. Implementing Cyberwall can be done fast and without much effort (in most cases and setups). There are no specific appliances and related upfront investments required, existing infrastructure can be used.

Data handling and hosting in compliance with EU regulations

All data can be processed in your own datacenters or in high-security datacenters of our hosting partners. Information is handled in accordance with European laws regulating data storage and handling, no session information is stored or recorded. From a data-privacy perspective, Cyberwall basically acts like a basic HTTP/S proxy solution or a Web Application Firewall. Your organization might already use similar technologies or services at the moment.

Back-door free, made in Switzerland

 

Further resources

 

See downloads

Schedule demo

 

Get in touch

Q&A for Web Application Isolation

IT operations minimally impacted

Cyberwall produces no False Positives, thus no analysis thereof is required. Also, Cyberwall supports even complex applications without adjustments to the application itself. Therefore, the protected applications can as well be changed over time without the need of adjustments to Cyberwall. Cyberwall works transparent to end users, and mainly effortless for web application administrators.

Immediate protection without patching

Want to secure applications as soon as possible? Lacking the resources to fix critical vulnerabilities in productive applications? Or does the provider of legacy software simply not support your needs fast enough? Cyberwall can help. It simply puts most vulnerabilities out of the reach of potential attackers - and silently supports even very complex or outdated applications using old frameworks.

Fast deployment for faster time to value

Cyberwall can be deployed fast, whether it is on-premise, via our SaaS offering or as hybrid cloud solution. You choose the speed. The roll-out can be undertaken step-by-step, by increasing traffic secured via Cyberwall over time. Additional web applications used throughout your network can be added to the Cyberwall-protection over time and seamlessly. Depending on the requirements, we partner with local service providers to maintain larger deployments.

 

Full SSL encryption integrated

Encrypts all communication between users and all applications behind Cyberwall without any changes to the protected applications. Also, if numerous third party data source which not all support SSL are integrated in an application - Cyberwall will SSL-encrypt the communication between user browsers and all integrated third parties and end-points.

VPN tunneling can be replaced

If certain user groups need to connect to web applications securely, Cyberwall can replace VPN tunneling. Whether users have to connect from home offices, other external locations, or from internal to isolated networks - Cyberwall can be the intermediare ensuring a secured connection without the need to install, configure and maintain software on the connecting client devices. 

Back-door free, made in Switzerland

Protected by the mighty peaks of the Swiss Alps as well as the traditionally rather strong privacy regulations of Switzerland, we developed Cyberwall with love and passion for high security, personal freedom and privacy. We keep our software strictly backdoor-free and strive to select only backdoor-free third party products and services throughout all operations of our firm.

Data Leackage Prevention (DLP)

Cyberwall identifiies sensitive data directly right before passing it on to the end user devices for display, i.e. Cyberwall can block the display of sensitive data. Also, forbidden export of data, (e.g. xls, csv, pdf) will controlled by Cyberwall. Role based adjustments are possible.

Supports all common browsers, mobile & desktop devices

The technology supports all common, modern web browsers (Chrome, Firefox, Microsoft Edge, Safari and Opera) on desktops as well as mobile user devices. Cyberwall supports even complex, dynamic web applications and will be transparent to normal users - unless they are trying to analyse the applications source code.

No adjustment of WAF rules required

Cyberwall provides protection which doesn't depend on rules. Thus the adjustment of complex security rules, as needed by state-of-the-art Web Application Firewalls (WAFs) is not necessary. Even if you are operating WAF-like services, Cyberwall can complement these making constant updating of security-rules less critical. Cyberwall greatly reduces the complexity of security contexts by minimizing the visible attack surface.

Significant cost benefits and minimal upfront investment

In comparison to complex detection engines using a rule-based approach and requiring constant maintenance to be reasonably secure (like WAFs), Cyberwall is a leight-weight solution. It takes out the complexity of threat landscapes, saving security teams valuable time and resources. Implementing Cyberwall can be done fast and without much effort in most cases and setups.Handling during operations requires hardly any human attention over extended periods. There are no specific appliances and related upfront investments required, existing infrastructure can be used.

Seamless transition from test to production environments

Cyberwall can easily be implemented and activated for lab testing and demo environments of a specific application. It is not necessary to set up complex rules, systems or adjustments to the application. Development and security teams, as well as business management can test Cyberwall and convince themselves of the correct, perfectly normal functionality of the respective application behind Cyberwall - before transition to productivity. The step from testing environments to productivity is simple as well: DNS configuration, proxy servers of HTTP-redirects can be used to route live traffic via Cyberwall.

Reduced consumed bandwidth & traffic compression

Depending on web application and content, Cyberwall reduces the consumed bandwidth up to 50% in a typical setup. Also, Cyberwall delivers web applications as single source to the end user. This can result in an acceleration of the web app because less connections are established between web user and web servers. Furthermore HTTP pipelining and compression techniques are used to accelerate delivery of web applications.

Backdoor-free, made in Switzerland

Protected by the mighty peaks of the Swiss Alps as well as the traditionally rather strong privacy regulations of Switzerland, we developed Cyberwall with love and passion for high security, personal freedom and privacy. We keep our software strictly backdoor-free and strive to select only backdoor-free third party products and services throughout all operations of our firm.

Data handling and hosting in compliance with EU regulations

All data can be processed in your own datacenters or in high-security datacenters of our hosting partners. Information is handled in accordance with European laws regulating data storage and handling, no session information is stored or recorded. From a data-privacy perspective, Cyberwall basically acts like a basic HTTP/S proxy solution or a Web Application Firewall. Your organization might already use similar technologies or services at the moment.