Blog

blog-post-image

Stop Adware at The Gate: Secure Browsing Prevents Attacks and Protects Productivity

Browser-based and web-borne attacks are tricky for individual employees and organizations to defend against, as they exploit vulnerabilities, including outdated browsers, plug-ins, and other components,

blog-post-image
Another Great Day Along The Way: We Are Proud To Join the Invest101 Family

Today we announced an investment in our future from the prestigious Development METU Technopark Venture Capital Investment Fund (Invest101), established in cooperation with the Türkiye Development Fund (TDF).

blog-post-image
A Great Day for Our Customers, Channel Partners, and Company

Today we announced an important milestone for DefensX: we have closed a financing round by Revo Capital, a venture capital fund investing in truly innovative, seed & early-stage B2B or B2C technology ventures.

blog-post-image
DefensX Continues to Expand as we Welcome Exertis MENA as a Major Distribution Partner

Today we announced an important and exciting new collaboration with Exertis MENA, the Dubai-based arm of global distributor DCC Technology (Exertis).

blog-post-image
With Customers and Partners in Three of the World’s Largest Business Regions DefensX Welcomes an Exciting New Year

In the past year, there was a 74 percent increase in phishing attacks sent every second, while in general 98 percent of cyber threats involve some form of social engineering.

blog-post-image
An Exciting Finish to a Big Year for DefensX

Yesterday, we announced our latest distribution agreement, and our first in Europe and the Middle East.

blog-post-image
The Answer to Adversary in the Middle Attacks? Our Common Sense Solution Stopping Web-borne Threats At The Edge

In this age of technology, digital devices and applications have opened a variety of possibilities and opportunities for society to benefit from. Unfortunately, these same devices and applications have given cyber attackers more power than ever, allowing them to grow in speed, volume, and sophistication.

blog-post-image
As Exponentially More Employees Work from Anywhere, Traditional Approaches Require Hardening at the Edge, With Every Endpoint Secured

As attacks on endpoints continue to rise, fueled by more remote workers using the browser and cloud applications outside the traditional, physical perimeter, security teams are looking to Endpoint Detection and Response (EDR) offerings to add an important layer of security – especially as more computing and communications is moving to the edge.

blog-post-image
For Small Companies With Big Ambitions, Securing The Internet is The Key

The team at DefensX has a passion for helping entrepreneurs succeed, and we work every day with Managed Service Providers (MSPs) who share that passion.

blog-post-image
As The Number of Devices Used Continues to Grow in a Work From Everywhere World, Zero Trust Security Solutions Matter More Than Ever

Modern-day cybercrime is a significant threat to businesses, as it can lead to disruption of operations, breach of business and customer data, unauthorized access to networks, and more. These threats are increasing in both volume, sophistication, and speed, with every day, there are new headlines about data breaches, hackings, cyberattacks, and various forms of crimes against businesses.

blog-post-image
Behind the Scenes: Isoolate’s Journey to Our New Brand Name, DefensX

For the last two years, our mighty start-up has been developing what we consider to be the best remote browser isolation solution designed to protect businesses of all sizes from attacks that start at the edge of their networks: their employee’s desktop and mobile devices.

blog-post-image
Managed Service Providers Continue to Step Up to Help Their Customers Stay Protected and Prosperous

Digitalization is permeating society with most business and personal communication taking place online via social media and other applications.

blog-post-image
Zero-Trust from DefensX: Web Protection for the Modern Workforce

Let’s face it, most cybersecurity solutions have an age problem. They were built during a time when companies’ employees worked on-site, usually perched in front of a desktop computer all day. Jump to today, where a global pandemic has uprooted practically everything and everyone. Companies and cybersecurity have both had to adapt, and therein lies the issue. Few were originally built for a cloud-dominated, web-browser, app-based world. Enter DefensX.

blog-post-image
Proud to Partner with Pax8 to Address Growing Browser Based Cyber Threats

On July 27th, 2021 we announced a global partnership with Pax8, a company that simplifies the way organizations buy, sell, and manage cloud solutions, empowering them to achieve more with cloud technology, to provide managed service providers (MSPs) endpoint security solutions for all devices.

blog-post-image
How Remote Web/Mobile Browser Isolation Technologies Enhance the SASE Model and Future of Enterprise Security

The Secure Access Service Edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept that Gartner originally described in the August 2019 report, “The Future of Network Security.” Since then, the concept has matured and has come to embrace a simpler, more streamlined way to ensure security up and down the enterprise security stack.

blog-post-image
Addressing New Mobile Threats With Client-side Browser Isolation Solutions

We are very proud to introduce our latest white paper which provides business context as well as a high-level view of our unique technology which is far easier to deploy, manage and scale on mobile devices.

blog-post-image
Growing Collaboration Among Criminal Groups Heightens Ransomware Threat for Healthcare Sector

As Healthcare Organizations are Heightened Targets for Adversaries, the CTI Weighs In

blog-post-image
Learn How To Reduce Risk and Improve Productivity With DefensX's Advanced Threat Isolation Software

We are very proud to introduce our business white paper which provides business context as well as a high-level view of our unique technology which is far easier to deploy, manage and scale than alternative browser and web isolation solutions.

blog-post-image
DefensX is Honored to Bring Cybersecurity Solutions to Market with ConnX

As Enterprise Teams Continue to Work Remotely, DefensX is Honored to Bring Intelligent End-Point Browser and Web Isolation Solutions to Market with ConnX

blog-post-image
Assembling Experts Passionate About Cybersecurity and Innovation

There are few challenges more urgent for society to solve in the technology space than protecting infrastructure, applications, and data from cyberattacks given the risks breaches pose, especially as organizations continue their digital transformations, move to multi-cloud, and jump shift to work-from-home models.

blog-post-image
Mobile Devices at Work: The Attack Surface Expands As Remote Workers Grow

The increased use of mobile devices driven by the massive move to work-from-home models as the world continues to adapt and respond to the global pandemic has led to an uptick in mobile security threats.

blog-post-image
Browser Isolation: The Solution to Persistent Threats and Browser Vulnerabilities

The vast number of malware and ransomware attacks occur with the web browser and directly target the internet user when they are casually surfing the internet. Attackers are finding it easy to bypass preventative controls such as signature-based malware scanning, firewalls and secure web gateways (SWGs). Browser-based attacks are known to be the primary threat vector for attackers who are targeting users with vulnerable web browsers and plug-ins. According to Gartner, 49.6% of attacks are browser based.

blog-post-image
Risky Emails

E-mail originated complex attacks, have the most significant impact on enterprise security. Particularly spear-phishing, tailormade attacks designed social-engineering - can trick high-level users with spoofed e-mail content, and leads to irreversible damage. Such deceptive e-mails could flawlessly imitate the design of trustworthy organizations such as banks, tech corporations, governmental bodies, or trusted 3rd party partners.

blog-post-image
Endpoint Protection

Compared to a decade ago, web browsers have vital importance for the enterprise world. Following the introduction of HTML5, platform-dependent applications such as Java or Adobe Flash have been replaced with sophisticated corporate level SaaS applications. Being at the center of the enterprise workflow, browsers are now an undetachable part of endpoint devices or, simply they are the endpoint itself.