DefensX protects users from sophisticated cybersecurity attacks by isolating threats from reaching end-point devices, such as desktops, laptops, smart phones and tablets. Its transformational "application to content protection" technology gives an immediate boost to security posture on any device, anywhere, and over any network.
DefensX Security for the Cloud including mobile devices
DefensX works on all devices, networks and operating systems
How does DefensX work?
DefensX is democratizing cybersecurity by providing enterprise-level security protection to small and medium businesses with simple, efficient deployment (in seconds) and a low-cost subscription model. We provide small enterprises with advanced threat protection from credential exposure/phishing, ransomware/malware, zero-day attacks, and web-borne threats with remote and local isolation. DefensX also provides defense against URL filtering, CAS and other advanced features usually only afforded by large enterprises. DefensX works by consolidating several isolation technologies seamlessly to deliver the best cost-risk mix and provide cloud-native tools for organizations to implement their risk model and instantaneously apply it to the endpoints.
DefensX provides an embedded secure web gateway (eSWG) in the endpoints. An eSWG brings tremendous advantages to enterprises as it sits at the core of the risk categorization.
DefensX eSWG provides the following options:
✓Always-on Credential Exposure / Phishing Protection
As one of the principal attack vectors, phishing links are now being delivered via emails and mobile phone text messages, social media platforms, web pages or apps. The risk of exposed user credentials continues to grow with far-reaching consequences, including data breaches, systems being compromised, loss of brand reputation, and financial losses. Regardless of how phishing links are delivered, the attack occurs when a user clicks on the suspicious link, leading to a risk of a cyber-attack.
DefensX's user-driven whitelist-based phishing protection provides maximum security to protect our clients from phishing attacks and possible breaches. DefensX checks the user's previous history when a phishing link is clicked. If the phishing link is an URL visited for the first time, it protects the user's credentials and blocks the password field, and protects credential exposure.
✓ Web Protection
Almost 550,000 URLs are created every day in addition to those that exist. 40% of malicious URLs are found in good domains. Attackers embed malicious scripts and applications into web pages. Attacks include redirecting users to an attacker-controlled resource, stealing credentials in phishing attacks, and infecting computers & mobile phones with malware/ransomware.
Zero-day threats are weaknesses that are exploited by attackers and often go undetected by affected parties. In most cases, adversaries try to inject malware/ransomware by using drive-by-downloads, injecting a single code line, or using other technologies. And when an organization realizes they have been compromised, they tend to use intelligence tools to manage the situation, which often requires time to understand and respond to the attack.
DefensX applies user-friendly web protection technologies such as threat intelligence and whitelisting based on the URL risk score, so malware/ransomware would not reach the endpoints. DefensX's solution is a plugin installed in the end user's browser or an application installed in the end user's mobile device (IOS/Android).
DefensX’s Remote Browser Isolation (RBI) is a cybersecurity model which aims to physically isolate an internet user's browsing activity and the associated cyber risks away from their local networks and infrastructure. The defined session is executed on the cloud in a disposable container, and the rendered image of the visited page is sent back to the end user's browser. RBI is the most secure threat isolation technology that currently exists.
✓ SaaS Application Access Protection
The increasing usage of Microsoft Office 365 and especially Microsoft Teams has been exponential in 2020, largely driven by work-from-home arrangements, but also as part of the growing trend to allow employees more flexibility while saving costs on everything from real estate to travel expenses.
The transformation to cloud-based SaaS applications, such as Microsoft Office365, has not been a straightforward step for many enterprises. Organizations are concerned about advanced security, performance & relevant network issues. More and more services are moving to the cloud, causing organizations to lose control of their sensitive data. Apart from that, more users access these resources from unmanaged devices, causing increased data exfiltration risks.
DefensX's capabilities are perfect for SaaS access protection. It enables safe access to critical data while using SaaS applications such as MS Office365, Salesforce, Workday, SAP, etc. DefensX also ensures user productivity without compromising potential data leakage.
✓ Immediate Value
DefensX gives an instant boost to your enterprise cybersecurity posture in minutes. All functionalities mentioned above are delivered immediately with a cloud-native, endpoint-driven approach. Engaging in DefensX allows enterprises to gain maximum cyber-security protection while saving time, effort and money. Traditional infrastructure-based cyber-security providers are more expensive with complex requirements and often use network access, VPN or split-VPNs or remote Desktop Protocols (RDP), which create additional cybersecurity deficiencies.
Traditional cyber-security providers typically transact their products with customers using enterprise encryption keys. This approach with shared enterprise encryption keys usually carries along potential risks around data leaks. In this case, DefensX operates in a seamless and secure manner that does not require its end users to use enterprise keys.
✓ Quick and Seamless Deployment
All functionalities mentioned above are provided by a single browser extension on desktops, laptops and via an application on mobile devices. End users can also install the extension or the application manually within seconds from App Stores. Enterprise deployment can be enforced with a simple Active Directory GPO or Microsoft Intune configuration. One of the key advantages of this approach is that it does not require updating or patching. Once the endpoint is connected to the Internet by any access method, patching or updates occur instantaneously before any risks can come into play. This eliminates operational costs and averts potential risks.
DefensX supports modern HTML5 browsers natively, and as such, it does not require "thin" or "fat" clients to be installed on endpoints including Windows, Mac, Linux. Isolate supports Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
DefensX democratizes cybersecurity by protecting end-users anywhere, on any device, from advanced cyberthreats with simple and efficient deployment and a budget-friendly subscription model.
DefensX Anywhere browser extension provides secure browser isolation for remote employees
Phishing is one of the most complicated threats facing enterprise users. DefensX solves this problem from the origin. The human eye could easily be deceived by spoofed content that is sent by emails or web pages imitating an online banking service.
DefensX prevents data exfiltration through file attachments. It catches violations with the help of integrated OCR engines and prevents the file from being uploaded.
Users can start a DefensX secure browsing session through any native browser such as Chrome, Microsoft Edge, or Safari. The Experience is seamless, so the user will not notice that the content is rendered remotely, including resource-hungry pages with dynamic elements.
DefensX provides the best user experience with the highest security. 4K or even higher-quality videos can be watched seamlessly. Many end-users never notice that DefensX is in action.
DefensX allows the IT admin to assign file transfer policies in detail. The admin can add new domains or remove existing ones to control the file transfers in both directions.
Copyright © 2021 Quantum Solution Pte Ltd - All Rights Reserved. UEN 202133407K
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.