RDP acceleration and compression that accelerates content delivery by up to 10x
Terminal emulation and host access solutions for the full range of platforms
Addressing the Healthcare Cybersecurity Crisis
When it comes to cyberattacks, the healthcare industry is the top-ranking target. Discover how Zero Trust solutions can keep ransomware and other threats away, and protect sensitive data, while enabling healthcare personnel to easily access the resources they need to care for their patients.
The Complex New Normal of Network Access
To maintain productivity through COVID-19 closures, successful organizations accelerated digitization. Now they must simplify secure access to resources that may be on internal networks or in the cloud, for users located in the office – or anywhere at all.
To Stop Public Sector Cyberattacks, in Zero We Trust
Public sector agencies are more vulnerable to cyberattack than ever before. Learn where the threats stem from and why CISA singles out web browsers as a focus of “constant concern” for public sector agencies at all levels -- local, state and national.
Key Questions to Ask RBI Solution Providers
In the face of escalating ransomware and zero-day threats, demand for Remote Browser Isolation (RBI) is surging as organizations bolster their web and email security defenses.
Spreadsheet - Key Questions to Ask RBI Solution Providers
Assure the success of your web security program by asking each Remote Browser Isolation (RBI) provider whose solution you are considering to respond to the questions on this spreadsheet, and recording the information they provide.
Airgap Endpoints from Web-Based Attacks
Protect endpoints and enterprise networks from browser-borne threats, including malware, ransomware, drive-by downloads, malvertising and even zero-day threats, while allowing users to interact seamlessly with the websites they need.
ZTEdge Web Application Isolation (WAI) and OWASP Threat Vectors
In this introduction to our series on how ZTEdge Web Application Isolation (WAI) addresses OWASP Top 10 app security risks, Dr. Chase Cunningham looks at common threats to web and internet-facing apps, discussing and demonstrating why better security is needed.
ZTEdge WAI OWASP Directory Traversal Issue Demo
Using a super-vulnerable fictional Juice Shop app, Dr. Chase Cunningham demonstrates how ZTEdge Web Application Isolation can protect web apps from directory traversal, a threat enabled by “Broken Access Control” (#1 in OWASP’s 2021 Top 10).
ZTEdge WAI OWASP Injection Demo
Chase discusses SQL injection attacks (#3 in the OWASP 2021 Top 10) and how they might enable administrative access to an application via a mishandled request – and then demonstrates a WAI fix involving hooking into an IAM provider.
ZTEdge WAI OWASP Session Storage Demo
This video covers basic risks of mishandling session tokens due to insecure design (#4 in the OWASP 2021 Top 10). Chase demonstrates using a WAI-based approach to remove the risk without impacting or rebuilding the application.
ZTEdge WAI OWASP Certifications Demo
To demonstrate how ZTEdge WAI can address software and data integrity failures (#8 in the OWASP 2021 Top 10), Chase discusses missing SSL certificates and shows how an SSL certificate problem can be resolved by managing the certificate in a novel way.
ZTEdge WAI OWASP Port Scan
WAI thwarts recon via application port scan, a type of server-side request forgery (#10 in the OWASP 2021 Top 10), by turning web-facing app surfaces dark and preventing threat actors from mapping out assets with simple queries and scans.
Gartner's Secure Services Edge and RBI's Role in the Cloud Security Stack.
Gartner has recently broken its Secure Access Services Edge construct into two parts, WAN Edge Services and the Secure Services Edge (SSE). In this 5-minute video, Ericom's Gerry Grealish presents the SSE construct and describes the key Remote Browser Isolation (RBI) use cases within the SSE mix.
Remote Browser Isolation, Explained
A quick 90-second explanation of how Remote Browser Isolation (RBI) makes browsing safe for users and businesses by keeping browser exploits away from enterprise endpoints, so ransomware and other malware cannot get in.
IT Consulting and Outsourcing
A multinational IT consulting company was seeking a secure way for remote users to access HR apps on the enterprise network while protecting potential attack surfaces from malicious actors seeking vulnerabilities
Israel’s leading investment house needed a way to protect its hundreds of thousands of private and business account holders from internet-borne threats
This manufacturing company needed an effective, simple solution to enable local and remote user access to apps and desktops. Read why they chose Ericom Connect.
As a critical care hospital for children, Alyn needed to provide medical and support staff with 100% secure, hassle-free access to the web sites and apps they need.
The manufacturing company needed an effective, simple solution to enable local and remote user access to apps and desktops
Financial Services Businesses
Eliminate IT involvement in exception requests, while protecting FiServ systems from web-based ransomware, social engineering and credential theft
A Zero Trust Approach to Web Browsing
Ericom VP Ravi Pather discuss the tension between business users and security teams regarding web use, and how browser isolation eliminates that tension by enabling every website to be browsed safely.
A New Architectural Approach to Web Browsing
Alessio Aceti, Sababa Security, and Ericom’s Ravi Pather and Nigel Willis explain why traditional browser architecture is inherently risky, and describe innovative architecture that enables browsing, yet prevents web-based attacks.
Stop Browser Exploits from Letting Ransomware In
Web browsers are the most used apps on the planet, as well as the most frequently exploited. In this 7-minute mini-webinar, learn how to prevent criminals from exploiting browser vulnerabilities to get malware onto endpoints, and from there to company networks.