By using
virtualisation to
create hardware-
isolated virtual
machines (VMs)
on each endpoint,
organisations can
create a virtual wall
around critical IP
and applications to
keep hackers out.
www.intelligentciso.com
|
Issue 08
isolated virtual machines (VMs) on each
endpoint, organisations can create
a virtual wall around critical IP and
applications to keep hackers out.
OLIVER
OLIVER CANTOR,
CANTOR, ASSOCIATE
ASSOCIATE
DIRECTOR
DIRECTOR OF
OF PRODUCT
PRODUCT
STRATEGY
STRATEGY AT
AT VERIZON
VERIZON
This secures connections to and from
server applications hosting critical IP.
In other words, malicious software,
hijacked admin accounts or even
nation state actors with access to the
endpoint’s OS cannot read or write the
VMs memory or its keyboard input –
preventing threats such as keylogging,
screen capture, memory tampering and
man-in-the-middle attacks.
All of this is invisible to employees, who
believe they’re running a simple VDI
viewer on their machine. This allows
organisations to rest easy about their
security and focus on the business, while
providing robust and secure access to
sensitive and classified assets.
As companies have embraced new
digital technologies, they’ve opened
up more opportunities for greater
73