Secure Virtual Meetings from
Web-based Threats

Virtual Meeting Isolation secures the web interfaces of apps like Zoom and Teams, addressing vulnerabilities and providing data-sharing controls that prevent the inadvertent leakage of sensitive information.

Your Challenge:

Virtual Meetings Expose Networks and Data to Cyber Risks

bug icon

Data Loss

bug icon

Compromised Endpoints

bug icon

Malware

bug icon

Uninvited Attendees

Use of virtual meeting platforms like Zoom, Microsoft Teams, and Google Meet have become the norm in most organizations. In the new distributed work environment, these tools are a key part of how teams stay connected.

Unfortunately, these tools have created new security vulnerabilities that need to be addressed. For example, cyber criminals have focused their attention on these solutions and launched new attacks targeted on stealing shared data, gaining access to internal IPs of attendees and their devices, delivering malware through infected links in chats, and attending meetings to gather corporate intelligence. Forbes covered the annual Pwn2Own competition which proved how vulnerable Microsoft Teams and Zoom are.

Perhaps just as concerning to CISOs and CIOs is the limited security controls these apps have, which opens the door to employees inadvertently sharing sensitive information within virtual meetings, either in chat, screen shares, or even via their cameras in their background images and desks. While the client applications of Zoom and Teams provide some control, the security policies of many organizations do not permit client-side software to run on their devices. As a result, with no ability to address these security concerns, many companies have been forced to limit their use of these key meeting solutions.

Our Solution:

Ericom Virtual Meeting Isolation: Complete Protection from Cyber Threats

bug icon

Isolate Web Portals

bug icon

Cloak IP Addresses

bug icon

Restrict Content Sharing

bug icon

Prevent Intrusions

Ericom Virtual Meeting Isolation (VMI) is an innovative solution that preserves all virtual meeting functionality while protecting organizations from potential cyberattacks targeting tools like Zoom and Teams while also providing controls to address inadvertent data loss/exposure by legitimate users of these solutions. VMI supports the web portals of virtual meeting solutions and requires no agents or software to be deployed on devices.

ZTEdge VMI renders the web portals of apps like Zoom in remote, isolated containers in the cloud. This approach delivers a standard virtual meeting experience for users, while empowering IT and Security teams with a number of powerful security controls:

  • The virtual meeting activity of each participant can be controlled:
    • Limit who can share screens or use cameras and microphones
    • Determine who can upload and share files
    • Select which users can engage in the chat box
  • The IP addresses of connecting endpoints are not exposed
  • Any web links shared in chat will be rendered in isolated environments ensuring that malicious sites/links do not compromise endpoints
  • File uploads/downloads can be scanned for malware with CDR or data loss with DLP
  • Secures against unauthorized or malware- enabled recording of virtual meetings

 

This innovative patent-pending solution isolates virtual meetings so organizations can conduct business securely without interruption.

Protect Your Organization from Malware Delivery and Data Loss Enabled by Instant Messenger Encryption

Instant Messenger (IM) web clients, including the wildly popular WhatsApp Web, are a great productivity tool for users – which is why they love them. But their end-to-end encryption approach creates a huge blind spot for most security stacks. Ericom Remote Browser Isolation (RBI) solves this productivity-versus-security dilemma for organizations, protecting endpoints and networks from malware, ransomware, and other exploits that can be hidden within open chats on IM web clients.

Ericom Zero Trust Web Isolation uses RBI to render website content in virtual browsers located in cloud-based containers.

Only safe rendering information is sent to users’ regular web browsers, provides a natural, fully interactive user experience, while safeguarding devices and networks from malware hidden on websites – even advanced zero-day ransomware.

Learn More

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo