Endpoint/Device Security, Security Architecture
BrandView

Three key components of endpoint isolation — part 1

Ask any security practitioner what causes them the most pain and endpoint security will surely be somewhere near the top of the list. This is especially true in the last two years, amid a pandemic that forced a massive shift to remote work, creating many more endpoints to keep track of.

“The endpoint is the key security battleground,” says Jonathan Gohstand, Director of Technical Marketing and Security at HP Wolf Security. “It’s where people, data, and the Internet meet. Organizations invest a lot in endpoint security, since that’s still where most attacks originate. Clearly, security teams have not ‘solved’ the endpoint security problem.”

Endpoint security must be made as efficient as possible to reduce costs, minimize user experience issues and reduce operational complexity, he says. Endpoint isolation is the way to do this, but many people are unfamiliar with the technology.

Gohstand says there are three key components to endpoint isolation. This article focuses on the first one: micro-virtual machines.

Micro-virtual machines are the heart of endpoint isolation, which virtualizes tasks to massively decrease the attack surface while preserving user workflows.

Each “risky” task such as opening a browser tab or Word file attached to an email is isolated inside its own CPU hardware enforced “micro-virtual machine”.

When the task is completed, the uVM is destroyed, taking any malware with it.
Value propositions
Here are just a few of the benefits of endpoint isolation, according to Gohstand:

Inherent protection:
• Zero Trust is achieved because all untrusted sources run within an isolated space on the endpoint. Nothing received is assumed to be trustworthy.
• It doesn’t rely on detecting anything – it inherently protects.
• It protects against attacks leveraging both corporate and personal vectors, including personal email accounts.

Accuracy
• Isolating tasks in a realistic execution environment catches what other approaches miss.
• Catches malware that requires user interaction to activate

Secure browser and privileged activity controls
• Force all browsing activity inside uVMs allowing a PC to both access sensitive data and be used for personal web browsing
• Isolate and protect privileged user activity (IT administration, access to key data and apps and OT/IoT administration) from everything else on the machine – even if the system is compromised
• Isolate privileged activity using web portals, Citrix ICA, RDP and SSH.

Visibility
• Safe space for executing malicious code
• A realistic environment for suspicious code providing superior threat intelligence
• Full-on introspection: full forensics on malware TTPs
• Cloud analytics for historical analysis

Security Efficiency
• Reduce support tickets, especially high-priority tickets
• Decrease endpoint remediation with fewer false positives

He also cites other benefits, including not compromising user experience, removing the need to use a sandbox, and more efficient compliance controls. Click here for details on HP Wolf Security’s approach to endpoint isolation.

Bill Brenner

InfoSec content strategist, researcher, director, tech writer, blogger and community builder. Senior Vice President of Audience Content Strategy at CyberRisk Alliance.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.