Companies slow on zero-trust uptake despite skyrocketing costs of cyberattacks
A recent article from DarkReading highlights the dire situation facing companies as the number of cyberattacks increase and the cost to recover from them balloons. According to a Dell Global Data Protection index survey, the average recovery cost in 2022 is over $1 million per incident, and disrupted organizations lost on average 2TB of data and suffered 19 hours of downtime.
Despite these alarming statistics, the survey indicated that 67% of respondents lacked confidence in their security measures. Additionally, while 91% were aware of or planning to deploy zero-trust security measures, only 12% are fully deployed.
One possible culprit behind the disparity between the understanding of the problem and the actions taken to fix it: A full zero-trust network architecture is extremely expensive and difficult to manage. Combined with the shortage of cyber security experts, this can become an insurmountable challenge to all but the most well-funded IT departments.
Remote browser isolation pushes zero-trust to the edge
It is a complex task to fully implement all the zero trust principles on an enterprise network. After all, networks have been built for decades on the premise that authenticated users can be trusted, and there is a massive number of both internal and cloud-based resources that need to be addressed across the board.
Over the last several years, however, more and more work is being done via web-based apps in the browser. This has partially fueled the rapid growth in internet browsing security and antiphishing software. One key development has been the application of zero trust principles to the browser via remote browser isolation (RBI) software. These solutions open web applications on virtual machines off your network, so that any malicious code runs on throwaway cloud infrastructure that doesn’t have access to your internal network.
The main problem with RBI solutions is that, up until now, they have all been expensive and difficult to manage. Frequently requiring hours of set up and configuration to ensure that the correct traffic is isolated, existing solutions create an additional burden on already-overburdened IT departments. And because running all or most browsing sessions in the cloud is expensive and resource intensive, the existing solutions are also costly enough that it is impossible to deploy across every browser on every endpoint within an organization.
Smarter, dynamic browser isolation
In response to these problems, Conceal has drawn on our years of experience selling remote browsing and managed attribution solutions to government and Fortune 500 organizations to create a smarter, simpler, and better solution. ConcealBrowse provides enhanced protection in Google Chrome and other browsers by being smart about when to use remote browser isolation.
By scanning every URL a user attempts to access in their browser and conducting an instant risk assessment, ConcealBrowse can ensure that risky sites are opened in isolation without wasting resources isolating low risk ones. This means that employees can still get their jobs done, even when it requires the use of riskier web sites and applications. Browser security is no longer reliant on users making their own judgments on what to trust, truly pushing the concept of zero trust to the edge.
All of this is achieved with minimal cost and extremely low administrative overhead. Once ConcealBrowse is installed, it starts working immediately without any required policy or settings adjustment. It’s a true plug and play solution. One of the first things our customers say whenever we ask for feedback is “It just works – I don’t really have to think about it.”
We believe ConcealBrowse is the future of browser security, so we’ve designed it to be easy to implement and easy to integrate into your existing security stack. If you’re interested in finding out more and seeing ConcealBrowse in action, request a demo today.