Improve Employee Productivity with the Freedom to Access the Applications they Need

The Problem
The last year has led to an increase in remote work, and an increase in cyber threats, with 70% of breaches originating on the endpoint. One of the ways IT teams have been dealing with the increasing endpoint threats is by constantly locking them down, significantly restricting employees IT freedom and often prohibiting employees from doing their job. This conflict is exacerbated due to the move to remote work and the need for more collaboration and communications tools. These may be necessary for daily work, but they are also potential avenues that enable infiltration of malware into the organization, and exfiltration of sensitive data. IT and Security want to limit these applications, but management insists they are necessary productivity tools. You end up in “whitelisting hell”, wasting precious resources on checking and approving a never-ending list of websites.
The Solution
Perception Point Advanced Browser Security adds enterprise-grade security to native Chrome and Edge browsers. The managed solution fuses patented web isolation technology with multi-layer advanced threat detection engines which delivers the unprecedented ability to isolate, detect and remediate all malicious threats from the web, including phishing, ransomware, malware, APTs, and more.
Untrusted, risky websites and applications are automatically opened and used in the secured browser which is isolated from corporate data and applications. Access to sensitive corporate apps is secured via an isolated, trusted Chrome or Edge browser. This prevents data loss (DLP) from both managed and unmanaged endpoints.
The behavior of the secured browser is managed in the cloud, while all of the computing resources run locally on user endpoints. This eliminates the need to invest in a large and costly infrastructure, and provides a better local user experience in terms of speed, along with offline availability.
We add advanced security to native Chrome and Edge browsers to protect your organization against all malicious threats from the web and protect access to sensitive corporate apps.
Using Perception Point, IT and security teams can provide corporate users with an isolated Chrome or Edge browser that runs on the user’s device so users can access sensitive systems and data from a completely isolated and secure bowser but also work freely, with less restrictions in their daily, not privileged, activities. Perception Point Advanced Browser Security is easily installed on user endpoints, but managed from the cloud, so you can quickly and simply deploy it and scale it across your company, customizing settings for each team and their needs. Unlike cloud based traditional VDI or DaaS solutions, Advanced Browser Security provides a great native user experience, with minimal lag and latency and is cost effective due to the fact that the isolated Chrome and Edge browser is running on the user’s device and not as a dedicated workload in the cloud.
The Problem
The last year has led to an increase in remote work, and an increase in cyber threats, with 70% of breaches originating on the endpoint. One of the ways IT teams have been dealing with the increasing endpoint threats is by constantly locking them down, significantly restricting employees IT freedom and often prohibiting employees from doing their job. This conflict is exacerbated due to the move to remote work and the need for more collaboration and communications tools. These may be necessary for daily work, but they are also potential avenues that enable infiltration of malware into the organization, and exfiltration of sensitive data. IT and Security want to limit these applications, but management insists they are necessary productivity tools. You end up in “whitelisting hell,” wasting precious resources on checking and approving a never-ending list of websites.
The Solution
Perception Point Advanced Browser Security adds enterprise-grade security to native Chrome and Edge browsers. The managed solution fuses patented web isolation technology with multi-layer advanced threat detection engines which delivers the unprecedented ability to isolate, detect and remediate all malicious threats from the web, including phishing, ransomware, malware, APTs, and more.
Untrusted, risky websites and applications are automatically opened and used in the secured browser which is isolated from corporate data and applications. Access to sensitive corporate apps is secured via an isolated, trusted Chrome or Edge browser. This prevents data loss (DLP) from both managed and unmanaged endpoints.
The behavior of the secured browser is managed in the cloud, while all of the computing resources run locally on user endpoints. This eliminates the need to invest in a large and costly infrastructure, and provides a better local user experience in terms of speed, along with offline availability.
We add advanced security to native Chrome and Edge browsers to protect your organization against all malicious threats from the web and protect access to sensitive corporate apps.

Benefits
1
Reduce the time and money spent on security auditing, checking certifications and whitelisting applications.
2
Your team can access untrusted websites and SaaS apps, without security concerns and without added latency.
3
Untrusted web content is deeply scanned and opened in the secured Chrome or Edge browser, reducing the risks from viruses and other downloadable threats. Productivity and collaboration web applications are opened in a secured browser so you can work without concern about introducing malware, ransomware, viruses and other issues.
4
Reduces risks from USBs and printer applications by automatically redirecting usage to Advanced Browser Security.
Contact us for a demo or download the free version of our Advanced Browser Security here.

Takeaways from the CircleCI Incident
Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the attacker was able to potentially access and steal data from a subset of databases and stores.

Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers
The integration provides crucial protection for businesses’ most vulnerable departments – help desks and customer support teams – preventing the most advanced threats sent by online users

Malicious Office Macros: Detecting Similarity in the Wild
In this blog, we focus on similarity in the context of Microsoft Office macros, which are widely exploited by attackers to deliver malware.