CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

CYBERSEC 2021 Partners Exhibitors

ERICOM SHIELD

Booth Number:B34

Ericom Software is a global leader in securely connecting the unified workspace. Ericom empowers today’s connected workforce and the IT organizations that support them by securing and optimizing desktop, application, and web content delivery to any device, anywhere. Founded in 1993, Ericom provides enterprise-grade secure remote access, desktop virtualization (VDI), and web security solutions to organizations across all industries. With a focus on application delivery, cloud enablement, and secure browsing, Ericom advances secure connectivity—providing end users with a superior work experience and optimizing enterprise productivity.

Ericom provides concrete business value by empowering timely and secure access to key resources such as applications, desktops, data, and cloud-based information while ensuring that the user experience remains natural and smooth, regardless of the conditions, device or location. Moreover, Ericom Solutions cost-effectively optimize IT efficiencies and access infrastructures, extend the life of IT assets, and increase business efficiencies, translating into lower TCO and higher ROI.

White Paper

Browsers are the Target: Protect Them with Zero Trust Browser Isolation

A fundamental shift in how we combat malware attacks on vulnerable browsers and webmail is required. One that stops the cat and mouse approach that leaves legitimate users always at risk, and instead stops all malware from entering via these vectors. You read that right – 100% of the threats from the web, stopped. We’ll introduce you to how this can be done – a technique called Browser Isolation – but let’s first better understand whysecuring web browsers can be such a challenge.

Zero Trust Browsing: Protect your organization from its own users

-Scams come and go: Human nature remains

-Phishing sites out-nimble browser safe modes

-We have met the enemy, and he is us

-Zero Trust Browsing: What you can't authenticate, isolate

-Protect users – and your business from their own errors

Locking down the vault: Keep cyberthreats away from your business

Small and medium-sized financial service organizations local banks and credit unions, brokerages, financial advisory firms, and accounting and insurance practices often earn high marks for customer service. When it comes to cybersecurity, however, it’s a challenge for smaller firms with limited staffing and security budgets to keep pace with their larger peers.

Digging outside of the sandbox: Why Browser-borne malware's too tough for the sandbox

When you think about common anti-malware security techniques, ‘sandboxing’ undoubtedly comes to mind. This technique was first applied in the early 1990s and has proven so highly effective that it is still used widely today, over twenty years later. In recent years, sandboxes with built-in analytics have been leveraged to add an extra layer of security to anti-virus, firewall and other defensive solutions, providing a safe place to “detonate” files that might carry zero-day exploits, ransomware and other threats without risking endpoints or the networks to which they’re connected.

Today, with browser-borne threats becoming an increasingly grave concern for organizational endpoints and networks, does the sandboxing approach still provide adequate protection against browser-executable malicious code? Let’s dig into the issue and see where it leads us.

Time to upgrade to Zero Trust Network Access

Businesses worldwide are facing substantially elevated security risks the unintended result of doubling down on VPNs to quickly connect suddenly remote workforces to the corporate apps and data they need. Cybercrime has surged as hackers exploit new opportunities to penetrate organizations with relative ease. In response to this increase in advanced threats, more businesses are exploring adding Zero Trust Network Access capabilities to protect their networks. In this paper, we discuss two ways to add these important safeguards: Through Software Defined Perimeter (SDP) solutions and with a new solution called Ericom Application Isolator.

Video

Airgap Endpoints from Web-Based Attacks

Protect endpoints and enterprise networks from browser-borne threats, including malware, ransomware, drive-by downloads, malvertising and even zero-day threats, while allowing users to interact seamlessly with the websites they need.

RBI: The Ounce of Ransomware Prevention That Saves You from £££ -- and $$$ -- of Cure

Every day, new headlines report ever more audacious ransomware attacks, and the companies involved face hard decisions about whether to pay up or take their chances. But many of these ransomware attacks could have been prevented in the first place. Watch to learn how.

Prevent Potential Ransomware Infection, 100% of the Time

John Peterson, Chief Product Officer of Ericom Software, explains how Ericom Shield Remote Browser Isolation prevents ransomware and phishing attacks. Watch to learn how!

Ericom Shield

Ericom Shield handles browsing sessions remotely, blocking web-borne threats from penetrating your enterprise. Isolating users from malicious web content, Ericom Shield eliminates the browsing web threat vector while maintaining user productivity.

【Function Features】

Browse with Confidence

- Empower users to click without fear of data exploits, ransomware, malvertising and other threats.

- Increase productivity by allowing all users to freely access websites they need.

- Download files without concern about malware with factory-integrated file sanitization.

Make IT Easy

- Reduce IT complexity, costs and management associated with blocking malware at the end-user device.

- Scale up quickly, without endpoint installations or plug-ins.

- Centrally manage solution across all devices and operating systems.

Browser Isolation

- Executes 100% of active web content off of endpoint, in a remote disposable container.

- Renders websites as a safe interactive content stream.

- Delivers transparent, natural browsing experience for users.

Sale Contact Information

Product Category

  • Zero Trust Architecture
ERICOM SHIELD