All Roads Lead to the Browser: A SANS Buyer\\'s Guide to Browser Isolation

  • Webcast Aired Wednesday, 06 May 2020 10:30AM EDT (06 May 2020 14:30 UTC)
  • Speakers: Rajiv Raghunarayan, Matt Bromiley

According to Verizon's DBIR, nearly 90% of successful endpoint compromises involve the browser, including ransomware, spearphishing, credential theft and social engineering. The web browser is an essential tool for businesses, especially in the age of cloud services and third-party applications. Thus, it's no surprise that the browser has become a crucial vector for the early stages of an intrusion and an integral part of attacks, such as spearphishing and weaponized documents.

In this webcast, SANS Instructor Matt Bromiley examines the concept of browser isolation. Browser isolation focuses on limiting the impact a browser can have on a victim system, preventing web code from reaching the endpoint. With better utilization of technology, browser isolation has become a more seamless and effective tool for your security teams.

This webcast also helps you determine whether browser isolation is a good fit for your organization and security posture, and where browser isolation may fit within your current security model. For many organizations, inserting a layer of control and/or mitigation between the user and the browser seems like a no-brainer. However, each organization's use cases are different. Learn how to identify what features may or may not work for you.

Attendees at this webcast will learn:

  • What browser isolation is and how it works to mitigate browser-borne attacks such as phishing, ransomware, credential theft and malicious downloads
  • Key factors to consider when evaluating, implementing and testing browser isolation solutions, including the capability to provide a seamless user experience
  • Options for integrating browser isolation into the current security posture to stop attacks earlier in the kill chain
  • Ways to manage browser isolation and ensure compliance with organizational requirements, such as data retention and regulations

Register today to be among the first to receive the associated whitepaper written by Matt Bromiley.