Visit Ericom Software at Infosec Europe for Exciting Reveals You Won’t Want to Miss

Author Avatar


Posted on June 16, 2023

After missing last year’s conference, Ericom Software, the Cybersecurity Unit of Cradlepoint, part of Ericsson, has returned to Infosec Europe in force, with lots of enthusiasm and some remarkable tricks up our collective sleeves. For some of the tricks, you just have to be there. We’re at Stand V88 – come and see what we mean, if you’re at the show. Better yet, book a meeting to talk to one of our team members and get a demo.

But others are neat tricks that you can – and should – try at home, at your office, or wherever you’re working. Here are some coming attractions for exciting reveals that you just shouldn’t miss.

Ericom smart trick #1: Stopping phishing-initiated cyberattacks, even when users click

Today, the vast majority of breaches involve the human element – 74%, according to the 2023 Verizon Data Breach Investigation Report and even more, according to others. The key enabling role that social engineering and other user factors play for cyberattacks is so taken for granted that exploit reports hardly bother to mention them as the true first cause. For instance, a recent article mentions phishing as an afterthought – the incidental start before the real start:

“The attack chain starts with a QBot infection. …The attacks began with a spam/phishing email containing malicious URL links.”

Even worse, the cybersecurity community at large has come to accept the fact that phish happens. They rely on secure web gateways and firewalls to filter social engineering emails, IMs and social media posts that contain known-bad URLs or malware with signatures that are known. But regarding zero day threats and spoofed credential theft sites that were quickly spun up and will be as quickly removed, they’ve thrown up their hands.

Faced with these undetectable threats, IT security professionals have turned to anti-phishing training as a last line of defense to catch what technology solutions let past.

But therein lies the rub: The “last line of defense” is human, precisely the weak link that social engineering is designed to defeat. In short, it is no wonder that there’s little mention of phishing in attack chain analyses, since it is obviously how most malware gets in. And equally obvious – yet wrong – that there is little or nothing that anyone can do to stop it.

Except Ericom Web Security, that is.

In our first trick at Infosec UK, Ericom boldly strikes down the forces of apathy that have convinced the cyber community at large that social engineering attacks cannot be solved. As a Zero Trust approach to web browsing, Ericom Web Security isolates content of not-known-to-be-safe sites in the cloud. Malware that is downloaded when a malicious site is opened or when a user clicks a malicious image or link in an email or even rolls over a bad pixel, remains isolated along with all active content from the site. Only clean rendering data reaches the user endpoint, even if a user clicks on a link that triggers a zero-day exploit.

In general, Ericom Web Security enables users to interact with websites as they usually do, for an experience that is identical to standard web browsing. But to protect users from manipulative credential theft, IT security can opt to have Ericom Web Isolation restrict browsing to read-only mode for newly created or other potentially risk sites.

Finally, to defend against documents and downloads that are weaponized with malware that detection-based solutions simply pass through, Ericom Web Security applies content disarm and reconstruct (CDR) to sanitize documents in isolation before downloading safe versions to user endpoints.

Ericom Smart Trick Number #2: Eliminating vulnerable VPNs & unmanaged device risk

For our next trick (drumroll please) at Infosec Europe, Ericom cybersecurity experts address the challenge of providing secure remote access for users working from unmanaged devices.

But here’s the real magic: Without depending on vulnerable VPNs or requiring software agents or clients to be installed on user devices, Ericom Clientless ZTNA enables granular policy-based control of user access to corporate resources. Via easy-to-manage controls, the cloud solution restricts which apps each user can access; what data they can view in those apps; and what actions each individual can take – such as editing, uploading, exporting, printing and more.

Ericom Clientless ZTNA simplifies secure remote connectivity to corporate web apps, SaaS applications and private apps for 3rd party contract workers, employees using their own personal devices (BYOD) and B2B customers – and especially for security IT.

As an isolation-based solution, it protects apps and the data within from compromise or breach via malware on user devices – or malicious actors lurking within. Data loss prevention controls ensure that no sensitive data is exfiltrated or lost, even when downloading and exports are permitted.

The Big Reveal: Powerful Prevention-Based Defense Against Cyberthreats

It’s time to come clean: While Ericom Zero Trust SSE solutions for Web Security, Unmanaged Device Risk, ZTNA and Virtual Meeting Isolation work like a charm, there’s no magic involved. Just smart innovation, hard work, and a strong commitment to understanding and addressing the cybersecurity challenges our customers face, without imposing a security tax on users who are simply trying to work.

Come by Stand V88 to learn about how your organization can strengthen its defenses against cyberthreats. And stay for the real magic that’s happening nearby.

Share this on:

Author Avatar

About Gerry Grealish

Gerry Grealish, ZTEdge CMO, is a security industry veteran, bringing over 20 years of marketing and product experience in cybersecurity, cloud, analytics, and related technologies. Responsible for marketing and business development, Gerry previously was at Symantec, where he led the product marketing and go-to-market activities for the company’s broad Network Security portfolio. Prior to Symantec, Gerry was at Blue Coat, which he joined as part of Blue Coat’s acquisition of venture-backed Cloud Access Security Broker (CASB) innovator, Perspecsys, where he was Chief Marketing Officer.

Recent Posts

Air Gapping Your Way to Cyber Safety

Physically air gapping enterprise networks from the web is a great way to protect operations, keep data safe … and squelch productivity. Virtual air gapping is a better approach.

Motion Picture Association Updates Cybersecurity Best Practices

The MPA recently revised its content security best practices to address, among other challenges, the issue of data protection in the cloud computing age.

FTC Issues Cybersecurity Warning for QR Codes

QR codes on ads are a simple way to grab potential customers before they move on. No wonder cybercriminals are using QR codes, too.