The Hoard Facts

Blog archive

Malware: Virtualized, Defeated, Disgraced

Invincea is a company with a simple idea that it likes to write about with dashing prose.

For example, in his blog, founder and CEO Anup Ghosh refers to 2011 as "the bloodiest year on record for Internet security," adding, "We've allowed ourselves to fall victim to a lost decade in innovation and have become mired in what we call the security insanity cycle."

Ghosh continues, defiant, to decry the utter ineptitude of the prevention security industry, before concluding the first paragraph of his blog with something of a call to arms, declaring in words redolent of the American revolution, "In other words, the white flag has been raised, the network has been ceded, and instead of keeping the intruder off your network -- you must lower the drawbridge, close your eyes, count to 10 and then try to figure out where they [the prevention security industry] have been hiding."

Suffice to say, the diatribe continues unabated in paragraph two. Ghosh may be verbose, but he has a niftly little anti-malware product dubbed Invincea Browser Protection that takes the most highly targeted application in your network -- the Web browser -- and seamlessly contains it in a fully virtualized environment. Running a VM local to the desktop, the company creates a completely segregated OS in which the Web browser operates, unmolested and immune to the depredations of malware.

In this highly sensitive environment, the very second malicious behavior is identified, its attack is instantly repulsed, an infection alert is sent to the user, and an automatic restoration process is begun. During this process, the tainted virtual environment is summarily sacked, pilloried and discarded, while the software "completely rebuilds from a pristine, gold state." The time from initial alert to complete rebuild is a mere 30 seconds.

Invincea also offers a similarly simple, yet devastatingly effective package that utilizes the same browser-based techniques to protect your users and network against insidious exploits embedded within Office Documents, PDFs, zip files and executables.

These products are as comfortable and effective in the home as they are on the job.

Posted by Bruce Hoard on 04/03/2012 at 12:48 PM


Featured

Most   Popular

Virtualization Review

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.