Blog Evolution of the security stack – voke Impact Note


August 6, 2018 Category: Innovation By: Gavin Hill Comments: 0

Evolution of the security stack – voke Impact Note

  • The security stack is changing to include application isolation
  • Employees demand fewer restrictions to do their jobs
  • IT operations teams need help to balance security with user productivity

The security landscape is continuously changing in response to the advances in the severity of attacks on organizations. Let’s face it, most businesses and government agencies acquire security solutions to protect their intellectual property, but, adding more layers of defense does not necessarily mean that you have better protection, especially when the layers of security rely on detection alone.

Bromium teamed up with an independent analyst firm, Voke, to explore how virtualization can help improve the organizations’ security stack and empower employees to work more freely without restrictions imposed by locked down environments.

IT operations are continuously solving for two challenges:

  1. Balancing security with end-user productivity.
  2. Responding to threats as quickly as possible to reduce the business impact of a breach.

In an attempt to boost security, IT teams often resort to implementing restrictive policies, limiting the end-users’ productivity and their ability to do their jobs effectively. Take for example an HR recruiter, whose job requires her to open candidate resumes that arrive as email attachments from untrusted sources. Or an accounts payable analyst, whose job it is to process invoices from outside vendors. In both cases, employees require access to “risky” data from potentially unknown sources to perform essential tasks required for their jobs.

However, even with email gateways and other layered defenses in place, detection-based solutions can never stop every threat, something is always going to slip through. To allow employees to work without restrictions and still protect the organization’s digital assets, IT teams need to look beyond detection. Application isolation can help balance security with productivity by protecting endpoints against threats, while giving employees the freedom to open email attachments, browse the web, or download files. Even if there’s a breach, malware is always contained, so endpoints don’t get owned.

Another primary responsibility of IT security teams is to quickly recognize and respond to threats. By allowing malware to run in a controlled, secure environment utilizing application isolation, they can rapidly triage threats and use the knowledge gained from the forensics data to take swift action and augment additional security investments.

For example, when an HR recruiter opens a resume that turns out to contain malware, the threat is completely hardware-isolated isolated, and the forensics data collected from it gives the security team the information they need to block C2 IP addresses on the gateway to stop future attacks even earlier.

The Impact Note provided by voke outlines security strategies that every organization should implement by:

  1. Making virtualization part of their security stack.
  2. Utilizing application isolation as the last line of defense by augmenting detection-based solutions.
  3. Empower employees to work without restrictions while they perform risky activities like opening emails from untrusted sources.

You can read the voke Impact Note, here.

How has your security stack changed using virtualization?


Enter your email address to receive notifications.

About the Author

Gavin Hill
Vice President, Product and Strategy at Bromium

Recent Posts

2018-08-30T07:39:44+00:00August 6th, 2018|Innovation|

Leave A Comment

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.