Drive-by Downloads,
Malvertising, and Web Exploits
Web-based isolation is now possible
Paul Misner
Federal Business Development
Spikes Security
pmisner@spikes.com
410-740-3490
Scott Martin
Chief Information Officer
Spikes Security
smartin@spikes.com
408-755-5713
THE WEB BROWSER IS THE MOST STRATEGICALLY
IMPORTANT APPLICATION IN TODAY’S INTERNET-
POWERED ENTERPRISE.
Browsers and the web
• Most strategically important application
• Most insecure and vulnerable to cyber attacks
• Most expensive business application to secure
Public Information 3
The web malware problem
• 81% say web browsers are the primary attack vector
• 55% of malware attacks coming through the browser
• 86% patch/update browsers to keep them secure
• 74% say detection-based tools no longer effective
• 51 average number of successful attacks in 2014
• $3.1M average annual cost to clean up attacks
Public Information 4
The problem grows…
We can’t keep up with the numerous security flaws
detected every day.
 Known Malware  Java Applets
 Flash  Server-side scripts
 Bad Websites  Zero-Day attacks
Internal resources with approved access can
breach confidentiality – intentionally or not.
Public Information 5
IT Security Prevention
Public Information 6
How many of your users…
Click Here???
Public Information 7
How many of your users…
can spot a Fake??
Public Information 8
• Data Loss Prevention is only as effective as what it knows about.
• Almost 1,000,000 new malicious code signatures every day!
• Each click of the mouse opens a clear, undetectable path
for data to exit our computers and networks.
• We simply can’t detect what we don’t know to look for.
Detection is not sustainable
Public Information 9
• Human Nature is to “Accept and Continue.”
• Can’t change the user’s experience.
• Access blocks don’t work.
• End users to find ways to circumvent
existing limited protections.
Human Behavior and the Browser
Public Information 10
Browsing solutions must evolve
to maintain network integrity
with minimal effort.
Public Information 11
Without Isolation
URL Filtering
Network AV
IDS/IPS
DLP
• Browsers download and
execute program code from
trusted and untrusted sites
• Even defense-in-depth
detection can’t stop
unknown attacks
• Once in, they can send
your intellectual property to
the world through the tiniest
holes
Public Information
80 443
12
13
Software-Based Browser Isolation
• Browser is isolated from
operating system with micro-
hypervisor.
• Micro-hypervisor is mini virtual
machine.
• If the browser is compromised,
in theory, the hypervisor will
block access to the OS and
other programs.
Public Information
• Software sandboxes can be penetrated
• Need to manage each system
• More powerful processors may be needed
• Additional endpoint memory and disk usage
• If something becomes resident, it’s on the internal network
• If something does get out, it’s on the user’s system
Issues with software based isolation
Public Information 14
A New Approach.
Hardware-Based Browser Isolation
Public Information 15
Hardware Isolation
URL Filtering
Network AV
IDS/IPS
Sandbox
80 443
• Physically separate and isolate
the browser from the endpoint.
• Place the browser in an
isolated network (DMZ).
• Users enjoy complete web
freedom and security while
keeping your data secure
• A highly managed user
experience provides oversight
into web-based activities
1200-
1299
1200-
1299
Public Information 16
Isolate™ Architecture
1) Architectural Isolation
Separation and isolation of
Layer 1 physical components
between browser and users
2) Resource Isolation
Isla server and endpoint Memory,
CPU, Storage, and Peripherals
are isolated from each other –
and from malware
Public Information
1200-
1299
1200-
1299
17
Isolate™ Architecture
3) Session Isolation
Each user session is
protected in its own VM,
hardware-isolated with Intel
VT extensions
4) Task Isolation
Within a single session, each
tab, or task, use processes
isolated from each other
1200-
1299
1200-
1299
Public Information 18
Isolate™ Architecture
5) Connection Isolation
AES 256-bit encrypted
communication between
appliance and each
individual user
6) Content Isolation
Proprietary command,
control and display
communication format
that malware cannot
compromise
1200-
1299
1200-
1299
Public Information 19
Isolate™ Architecture
7) Malware Isolation
Any malware activity is
isolated and contained within
the appliance
VMs are completely destroyed
after each use and never have
access to internal networks
1200-
1299
1200-
1299
Public Information 20
How it Works Provide an isolation
area to render content
in a secure network
Malicious websites become
harmless by rendering the
content in the isolated area. You
can now provide clean web
content to your users with true
hardware and network
separation.
21
THE INTERNET
• Isla sits in a DMZ/
isolated network
Basic Deployment
• Encrypted client to
Control Center and
appliance communications
• Isolated VM for each user
Interactive, Secure, Encrypted
Viewer Streams
• On command updates
• Centralized reports and
configurations
SPIKES SECURITY
SYSTEMS AND
CONTROL CENTER
Public Information 22
Interactive, Secure, Encrypted
Viewer Streams
THE INTERNET
Control Center Communications
• SSL Web-enabled Interface
• Maintains user and group
information
• Retains log and usage
information
• Holds your primary copy of
your appliance configurations
(Can only be pulled down by your appliances
and is only activated by administrators)
• Can be isolated on-premises
for additional security. SPIKES SECURITY
SYSTEMS AND
CONTROL CENTER
Public Information 23
Issues with Hardware Based Isolation
• Compatibility issues between browsing environment
and the actual user environment
– Proprietary Browser
• Web Applications try to use local OS resources
– Silverlight/SharePoint
• Use of webcam, microphone, printing, and
downloads breaks the principle of isolation
– Bypass Mode
• Additional Hardware Required
Public Information 24
• The race to save the end point isn’t working.
• Hardware based isolation removes 100% the possibility of
malware or spyware entering a network.
• With hardware based isolation, the need to capture browser
based attacks on the endpoint is negated.
Isolation Synopsis
Public Information 25
Conclusion
Hardware Based Isolation
1. Eliminates the web browser as a primary attack vector
2. Reduces unnecessary IT costs for forensics, remediation
3. Simplifies endpoint security complexity and admin
4. Restores secure web freedom for all employees
Public Information 26
ISLA
Deploying in the real world
Multiple Use Cases
Public Information 29
EXAMPLES
Typical Installation Scenarios
Basic Deployment
Public Information 33
MOST COMMON DEPLOYMENT
• Isla sits in a DMZ/isolated network
• Only authorized users can connect
• Encrypted client to server
communications
• Centralizes the source of all
web requests
Public Information 34
IN-LINE TOOLS DEPLOYMENT
• Used with existing Content Filtering
or other Information Security tools
• Isla sits the network before egress
through the existing InfoSec tools
• Encrypted client to appliance
communications
• Outbound web requests route
through the existing InfoSec
tools at the perimeter
Other In-line
Security
tools
Public Information 35
MULTIPLE SITES
• Isla sits in a DMZ/isolated
network
• Only authorized users can
connect
• Encrypted client to server
communications
• Centralizes the source of all
web requests
Public Information 36
THANK YOU
Spikes Security
www.spikes.com

More Related Content

PPTX
Spyware powerpoint
PPTX
Information Security Engineering
PPTX
INTERNET SAFETY FOR KIDS
PDF
Cyber security webinar part 1 - Threat Landscape
PDF
Defending Servers - Cyber security webinar part 3
PDF
Defending Workstations - Cyber security webinar part 2
PPTX
Zero day exploit
PDF
What is Network Security?
Spyware powerpoint
Information Security Engineering
INTERNET SAFETY FOR KIDS
Cyber security webinar part 1 - Threat Landscape
Defending Servers - Cyber security webinar part 3
Defending Workstations - Cyber security webinar part 2
Zero day exploit
What is Network Security?

What's hot (20)

PPTX
Endpoint Security Evasion
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PDF
End-User Security Awareness
PDF
Experience Sharing on School Pentest Project (Updated)
PPT
Network Security Tools and applications
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
PPT
Network security
PPTX
WannaCry? No Thanks!
PPTX
The Malware Menace
PPTX
The next generation of IT security
PPTX
Next-Gen Security Solution: Gateway Protection
PPTX
Cyber Security Terms
PPTX
Network security threats and solutions
PDF
Web Security
PPT
4 Steps to Optimal Endpoint Settings
PDF
Symantec: čas přítomný a budoucí
PPTX
Top 10 mobile security risks - Khổng Văn Cường
PPTX
ICT and end user security awareness slides
PDF
Presentation about security i.t.
PDF
Presentation about security I.T.
Endpoint Security Evasion
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
End-User Security Awareness
Experience Sharing on School Pentest Project (Updated)
Network Security Tools and applications
Cyber security webinar 6 - How to build systems that resist attacks?
Network security
WannaCry? No Thanks!
The Malware Menace
The next generation of IT security
Next-Gen Security Solution: Gateway Protection
Cyber Security Terms
Network security threats and solutions
Web Security
4 Steps to Optimal Endpoint Settings
Symantec: čas přítomný a budoucí
Top 10 mobile security risks - Khổng Văn Cường
ICT and end user security awareness slides
Presentation about security i.t.
Presentation about security I.T.
Ad

Viewers also liked (14)

PPTX
Using skype and excel to auto dial
PPTX
Menlo Security Isolation Platform
PPTX
WEB ISOLATION
PDF
Notes From Julie Hansen From Institute of Sales Excellence
PDF
CCD_2013_BrowserIsolation
PDF
Estimated Mean Presentation
PPTX
Ten Security Product Categories You've Probably Never Heard Of
PDF
Derbycon Bromium Labs: Sandboxes
PDF
Null Bangalore Meet 18/03/17
PDF
Content Marketing Strategies for Early Stage Startups by Ankit Oberoi, AdPush...
PDF
Using content to fuel your sales funnel
PDF
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
PDF
The Now and Next of Learning and Technology
PDF
Development and Engagement in the Age of Social Media
Using skype and excel to auto dial
Menlo Security Isolation Platform
WEB ISOLATION
Notes From Julie Hansen From Institute of Sales Excellence
CCD_2013_BrowserIsolation
Estimated Mean Presentation
Ten Security Product Categories You've Probably Never Heard Of
Derbycon Bromium Labs: Sandboxes
Null Bangalore Meet 18/03/17
Content Marketing Strategies for Early Stage Startups by Ankit Oberoi, AdPush...
Using content to fuel your sales funnel
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
The Now and Next of Learning and Technology
Development and Engagement in the Age of Social Media
Ad

Similar to Spikes Security Isla Isolation (20)

PDF
[CLASS 2014] Palestra Técnica - Michael Firstenberg
PPTX
CyberSecurity.pptx
PDF
Expand Your Control of Access to IBM i Systems and Data
PPTX
NAC_p3.pptx
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
Controlling Access to IBM i Systems and Data
PPTX
OWASP Mobile TOP 10 2014
PPT
ITE v5.0 - Chapter 10
PPTX
Cyber Security
PPTX
Implementing security for your library | PLAN Tech Day Conference
PPTX
It security the condensed version
PDF
Zero Day Malware Detection/Prevention Using Open Source Software
PDF
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
PPTX
dccn ppt-1.pptx
PDF
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
PPTX
Webdays blida mobile top 10 risks
PPTX
TOPIC7.pptx
PPTX
Chapter 11 computer security and safety, ethics, and privacy
PDF
Browser isolation (isc)2 may presentation v2
PPT
Implementing an improved security for collin’s database and telecommuters
[CLASS 2014] Palestra Técnica - Michael Firstenberg
CyberSecurity.pptx
Expand Your Control of Access to IBM i Systems and Data
NAC_p3.pptx
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Controlling Access to IBM i Systems and Data
OWASP Mobile TOP 10 2014
ITE v5.0 - Chapter 10
Cyber Security
Implementing security for your library | PLAN Tech Day Conference
It security the condensed version
Zero Day Malware Detection/Prevention Using Open Source Software
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
dccn ppt-1.pptx
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Webdays blida mobile top 10 risks
TOPIC7.pptx
Chapter 11 computer security and safety, ethics, and privacy
Browser isolation (isc)2 may presentation v2
Implementing an improved security for collin’s database and telecommuters

Recently uploaded (20)

PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
Understand the Gitlab_presentation_task.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPT
12 Things That Make People Trust a Website Instantly
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Mathew Digital SEO Checklist Guidlines 2025
simpleintnettestmetiaerl for the simple testint
Introduction to cybersecurity and digital nettiquette
Exploring The Internet Of Things(IOT).ppt
Understand the Gitlab_presentation_task.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
12 Things That Make People Trust a Website Instantly
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
The-Importance-of-School-Sanitation.pptx
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
t_and_OpenAI_Combined_two_pressentations
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
si manuel quezon at mga nagawa sa bansang pilipinas
newyork.pptxirantrafgshenepalchinachinane
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf

Spikes Security Isla Isolation

  • 1. Drive-by Downloads, Malvertising, and Web Exploits Web-based isolation is now possible Paul Misner Federal Business Development Spikes Security pmisner@spikes.com 410-740-3490 Scott Martin Chief Information Officer Spikes Security smartin@spikes.com 408-755-5713
  • 2. THE WEB BROWSER IS THE MOST STRATEGICALLY IMPORTANT APPLICATION IN TODAY’S INTERNET- POWERED ENTERPRISE.
  • 3. Browsers and the web • Most strategically important application • Most insecure and vulnerable to cyber attacks • Most expensive business application to secure Public Information 3
  • 4. The web malware problem • 81% say web browsers are the primary attack vector • 55% of malware attacks coming through the browser • 86% patch/update browsers to keep them secure • 74% say detection-based tools no longer effective • 51 average number of successful attacks in 2014 • $3.1M average annual cost to clean up attacks Public Information 4
  • 5. The problem grows… We can’t keep up with the numerous security flaws detected every day.  Known Malware  Java Applets  Flash  Server-side scripts  Bad Websites  Zero-Day attacks Internal resources with approved access can breach confidentiality – intentionally or not. Public Information 5
  • 7. How many of your users… Click Here??? Public Information 7
  • 8. How many of your users… can spot a Fake?? Public Information 8
  • 9. • Data Loss Prevention is only as effective as what it knows about. • Almost 1,000,000 new malicious code signatures every day! • Each click of the mouse opens a clear, undetectable path for data to exit our computers and networks. • We simply can’t detect what we don’t know to look for. Detection is not sustainable Public Information 9
  • 10. • Human Nature is to “Accept and Continue.” • Can’t change the user’s experience. • Access blocks don’t work. • End users to find ways to circumvent existing limited protections. Human Behavior and the Browser Public Information 10
  • 11. Browsing solutions must evolve to maintain network integrity with minimal effort. Public Information 11
  • 12. Without Isolation URL Filtering Network AV IDS/IPS DLP • Browsers download and execute program code from trusted and untrusted sites • Even defense-in-depth detection can’t stop unknown attacks • Once in, they can send your intellectual property to the world through the tiniest holes Public Information 80 443 12
  • 13. 13 Software-Based Browser Isolation • Browser is isolated from operating system with micro- hypervisor. • Micro-hypervisor is mini virtual machine. • If the browser is compromised, in theory, the hypervisor will block access to the OS and other programs. Public Information
  • 14. • Software sandboxes can be penetrated • Need to manage each system • More powerful processors may be needed • Additional endpoint memory and disk usage • If something becomes resident, it’s on the internal network • If something does get out, it’s on the user’s system Issues with software based isolation Public Information 14
  • 15. A New Approach. Hardware-Based Browser Isolation Public Information 15
  • 16. Hardware Isolation URL Filtering Network AV IDS/IPS Sandbox 80 443 • Physically separate and isolate the browser from the endpoint. • Place the browser in an isolated network (DMZ). • Users enjoy complete web freedom and security while keeping your data secure • A highly managed user experience provides oversight into web-based activities 1200- 1299 1200- 1299 Public Information 16
  • 17. Isolate™ Architecture 1) Architectural Isolation Separation and isolation of Layer 1 physical components between browser and users 2) Resource Isolation Isla server and endpoint Memory, CPU, Storage, and Peripherals are isolated from each other – and from malware Public Information 1200- 1299 1200- 1299 17
  • 18. Isolate™ Architecture 3) Session Isolation Each user session is protected in its own VM, hardware-isolated with Intel VT extensions 4) Task Isolation Within a single session, each tab, or task, use processes isolated from each other 1200- 1299 1200- 1299 Public Information 18
  • 19. Isolate™ Architecture 5) Connection Isolation AES 256-bit encrypted communication between appliance and each individual user 6) Content Isolation Proprietary command, control and display communication format that malware cannot compromise 1200- 1299 1200- 1299 Public Information 19
  • 20. Isolate™ Architecture 7) Malware Isolation Any malware activity is isolated and contained within the appliance VMs are completely destroyed after each use and never have access to internal networks 1200- 1299 1200- 1299 Public Information 20
  • 21. How it Works Provide an isolation area to render content in a secure network Malicious websites become harmless by rendering the content in the isolated area. You can now provide clean web content to your users with true hardware and network separation. 21
  • 22. THE INTERNET • Isla sits in a DMZ/ isolated network Basic Deployment • Encrypted client to Control Center and appliance communications • Isolated VM for each user Interactive, Secure, Encrypted Viewer Streams • On command updates • Centralized reports and configurations SPIKES SECURITY SYSTEMS AND CONTROL CENTER Public Information 22
  • 23. Interactive, Secure, Encrypted Viewer Streams THE INTERNET Control Center Communications • SSL Web-enabled Interface • Maintains user and group information • Retains log and usage information • Holds your primary copy of your appliance configurations (Can only be pulled down by your appliances and is only activated by administrators) • Can be isolated on-premises for additional security. SPIKES SECURITY SYSTEMS AND CONTROL CENTER Public Information 23
  • 24. Issues with Hardware Based Isolation • Compatibility issues between browsing environment and the actual user environment – Proprietary Browser • Web Applications try to use local OS resources – Silverlight/SharePoint • Use of webcam, microphone, printing, and downloads breaks the principle of isolation – Bypass Mode • Additional Hardware Required Public Information 24
  • 25. • The race to save the end point isn’t working. • Hardware based isolation removes 100% the possibility of malware or spyware entering a network. • With hardware based isolation, the need to capture browser based attacks on the endpoint is negated. Isolation Synopsis Public Information 25
  • 26. Conclusion Hardware Based Isolation 1. Eliminates the web browser as a primary attack vector 2. Reduces unnecessary IT costs for forensics, remediation 3. Simplifies endpoint security complexity and admin 4. Restores secure web freedom for all employees Public Information 26
  • 27. ISLA Deploying in the real world
  • 28. Multiple Use Cases Public Information 29
  • 31. MOST COMMON DEPLOYMENT • Isla sits in a DMZ/isolated network • Only authorized users can connect • Encrypted client to server communications • Centralizes the source of all web requests Public Information 34
  • 32. IN-LINE TOOLS DEPLOYMENT • Used with existing Content Filtering or other Information Security tools • Isla sits the network before egress through the existing InfoSec tools • Encrypted client to appliance communications • Outbound web requests route through the existing InfoSec tools at the perimeter Other In-line Security tools Public Information 35
  • 33. MULTIPLE SITES • Isla sits in a DMZ/isolated network • Only authorized users can connect • Encrypted client to server communications • Centralizes the source of all web requests Public Information 36