Innovative, client-less Isolation Service for web browsers through virtualization
Cyberwall executes all client-side code at remote servers,
so you don‘t have to worry about most attack patters any more
Multi-level protection for web facing devices
DEFEAT WEB ESPIONAGE
Search and surf the web without criminal organizations or nation states following your organization.
CLICK ON ANY LINK
Securely open any unknown link from your Email, Social Networks or Instant Messaging.
Securely open and render your office documents on remote infrastructure outside of your network.
Securely open any unknown link or email attachment via Cyberwall. Exploits stay out.
The first complete solutions against threats from the Web
Detection-based approaches don't really work on the web due to its very complex nature. Modern browsers support a broad variety of protocols, frameworks and content types, potential, known and unknown attack patterns are just too many. Securing web browsers in an open web is an almost impossible task - even for browser manufacturers themselves. Because of the ever changing thread landscape and the impossibility of error-free software, Immunization is a much more powerful concept. Cyberwall offers the first complete solution against threats from the web.
By transparently shielding web sessions, Cyberwall effectively protects enterprise networks against various attacks through web browsers. The solution also secures organizations' web privacy by effectively making browser based tracking impossible. Instead of filtering and blocking potentially harmful websites Cyberwall secures endpoints by isolating complete browser sessions in secure, virtual sandboxes running at hardened, isolated servers. Don't let your browser connect the web directly, surf indirectly via this platform.
Today, browser vulnerabilities are the most important element in modern cyber attacks
Cyberwall disables browser-based attacks by executing all client-side code at remote servers
Cyberwall supports desktops and mobile devices
All you need to do is to change your default search provider to Cyberwall or set-up Cyberwall as an (additional) proxy server. After that, web sessions will be executed remotely on Cyberwall. The Cyberwall thin-client is executed automatically. Usability of websites and therefore productivity of web usage stays unaffected since users simply keep using the browser they are already used to.
PLUGS INTO EXISTING ARCHITECTURES
Cyberwall is designed for simple integration with your existing network and security infrastructure. Integration is done by redirecting traffic to Cyberwall using modification of URLs. All the rest gets handled by Cyberwalls automagically.
SUPPORTS COMMON BROWSERS AND OPERATING SYSTEMS
Cyberwall supports all modern browsers (Chrome, Firefox, Safari, Edge, Opera), Operating Systems (Windows, Linux, Mac OS, BSD) and even mobile devices such as tablets and smartphones.
No additional software is required on your client computers. Just set Cyberwall as your homepage or proxy server and get protected on the fly. No additional configuration is necessary, Cyberwall is completely web-based and installation-free.
EASY INTEGRATION WITH ENTERPRISE WEB APPS
Cyberwall doesn't cause any complications with existing web apps. It allows you to use the same browsers you already use together with your enterprise applications. Just forward web traffic via Cyberwall and secure your clients against the threats of the web. Simple rules (PAC) can be set up to exclude local or remote websites from beeing streamed by Cyberwall.
Web browsers have become the central point of attack into corporate networks
BROWSER RELATED THREATS ARE A TOP CONCERN FOR IT SECURITY PROFESSIONALS
The browser is the central point of attack for cyber espionage. Browser Fingerprinting provides cyber espionage with an abundance of data about corporate web activities, which is then used to gather information about target networks.
40% of all successful network intrusions are possible due to security holes in browsers. In 2014 alone, 1.035 new exploits were found in the top-5 browsers (+42% vs. 2013). Nearly as many weaknesses were found in only 5 browsers, as in the 50 most commonly used corporate software applications (1.348 weaknesses; Source: Secunia 2014).