Isolate Access to Privileged Corporate Systems and Data

The Problem
Secure access to sensitive corporate systems and data is amongst the highest priorities for IT and security teams, as these are the holy grails for attackers and cyber security criminals. While corporations have invested millions to ensure that access to these systems and data is secured through the use of Identity and Access Management (IAM), Privileged Access Management (PAM) and and more recently, conditional access and Zero Trust approaches, the threat of accessing these systems from a compromised device continues to pose a significant risk to corporations. Some organizations have gone to the extreme of providing their privileged users with an additional device solely for the purpose of accessing sensitive systems and data and others are actively seeking methods to ensure that access to such systems is performed from a sterile and non-infected environment.
The Solution
Using Perception Point, IT and security teams can provide corporate users with an isolated Chrome or Edge browser that runs on the user’s device so users can access sensitive systems and data from a completely isolated and secure bowser but also work freely, with less restrictions in their daily, not privileged, activities. Perception Point Advanced Browser Security is easily installed on user endpoints, but managed from the cloud, so you can quickly and simply deploy it and scale it across your company, customizing settings for each team and their needs. Unlike cloud based traditional VDI or DaaS solutions, Advanced Browser Security provides a great native user experience, with minimal lag and latency and is cost effective due to the fact that the isolated Chrome and Edge browser is running on the user’s device and not as a dedicated workload in the cloud.

Benefits
1
Access privileged web apps from everyday corporate devices as well as 3rd party/unmanaged devices.
2
A seamless user experience as users are working in their native Chrome or Edge browser which is now secured.
3
Complete browser security without slowing down the user – no added latency
4
Restrict transfer of files or other clipboard data from the isolated browser.
5
Prevent screen and keyboard capturing from the corporate OS.
6
Cost effective – the isolated browser runs on the user’s device and not as a dedicated workload in the cloud.

Takeaways from the CircleCI Incident
Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee had privileges to generate production access tokens, the attacker was able to potentially access and steal data from a subset of databases and stores.

Perception Point Launches Advanced Threat Protection and Rapid Remediation for Zendesk Customers
The integration provides crucial protection for businesses’ most vulnerable departments – help desks and customer support teams – preventing the most advanced threats sent by online users

Malicious Office Macros: Detecting Similarity in the Wild
In this blog, we focus on similarity in the context of Microsoft Office macros, which are widely exploited by attackers to deliver malware.