Browser Isolation Hassle free secure browsing by containing all browsing activity in an isolated container. This isolated environment eliminates all known threats in order to protect the end-user device. It has the advantage that no websites need to be blocked. The end-user can safely browse the web without noticing anything and impacting productivity. Browser isolation can be integrated company-wide for every device, through cloud servers or on premise.

Browser Isolation

Hassle free secure browsing by containing all browsing activity in an isolated container. This isolated environment eliminates all known threats in order to protect the end-user device.

It has the advantage that no websites need to be blocked. The end-user can safely browse the web without noticing anything and impacting productivity.

Browser isolation can be integrated company-wide for every device, through cloud servers or on premise.

Web App Isolation

For SaaS vendors isolation technology can be directly applied on the product, delivering a secure service to the clients.

Using the container isolation technology, the end-user will only receive a graphical visualization of your data through an image stream.

Digital Vault

Secure files and password sharing.

The Digital Vault literally means ‘digital locker or safe’. It’s an online tool to securely manage passwords and documents. It offers different possibilities to share passwords or files in a safe way.

Web Application Isolation technology is used to protect the Digital Vault. Because of this, users only see an image of the confidential document. This way, documents never physically reach the user’s device. The user doesn’t notice anything and can look at and edit the document as usual.

 

The Digital Vault contains three key components.

1/ The app allows an easy and secure login process. Only the owner of the phone is able to access and edit the documents. If data is leaked, it would still be safe because it would be encrypted and unreadable to unauthorized users.

2/ Isolation technology only sends a stream of images to the client. The actual document and data are never transferred, thus never reach the end-user device.

3/ Container technology sets up a separate environment for every user. Documents are only decrypted within this personal container, so no chance of leaked data.

 

On top of securing your documents and passwords, the Digital Vault also provides complete traceability. All events are tracked within the system.

Penetration testing

  • Preliminary interview & scope definition
  • 1 day analysis
  • 2 days of testing (remote or on site)
  • API testing
  • Testing input forms
  • Testing server specific vulnerabilities
  • Extensive final report

Security Audit

Security Audit