What Is Bufferzone?
The BUFFERZONE virtual container protects any application that you define as insecure. BUFFERZONE is transparent to both the application and the end-user, yet completely seals off threats from the rest of the computer.
Unlike conventional endpoint detection solutions that depend on signatures or behavioral profiles to detect malicious activity, BUFFERZONE simply isolates malware regardless of whether it is known or new, and prevents it from doing any harm.
With BUFFERZONE Endpoint Protection Software, employees can safely browse the internet and open attachments in a virtual environment, and then securely remove files that they need from the container and share them with the rest of the organization.
While malware cannot exit the container, BUFFERZONE tracks malicious activity where it can do no harm and shares it with enterprise analytics.
Untrusted sources are isolated in a virtualized container
Potential threats isolated from endpoint’s native resources
BUFFERZONE automatically opens contained and uncontained instances of the browser
Endpoint-based network segmentation
Define separate firewall-type rules for contained and uncontained applications
Removable Media Protection
Access to the removable media is contained
Media accessible only from contained applications such as BUFFERZONE explore
Email Attachment Containment
Contains attachments from external sources
Emails arriving from outside the organization are saved uncontained on endpoints but are then opened on any protected endpoint in a BUFFERZONE container.
A CDR service cleans content from contained files before moving them to the trusted environment