Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/24/2013
02:36 PM
50%
50%

Spikes Launches AirGap Enterprise To Eliminate Malware Pandemic From Entering The Enterprise

Solution resides in the network DMZ rather than on end user devices

SARATOGA, Calif., September 24, 2013 -- Spikes, Inc., a leading cyber security company, today announced its launch and the general availability of AirGapTM Enterprise, an anti-malware Windows and Mac OS compatible browsing system that is purpose-built for extreme security, user-intuitive manageability and sustained high performance for the SMB-to-enterprise markets.

Cyber security is a top three business concern for executives in the United States and worldwide according to Lloyd's of London 2013 Risk Index Report. "Over 90% of undetected malware comes through the browser and enterprises employing the best cyber security practices to-date are still being hacked daily, often with catastrophic results," states Branden Spikes, CEO of Spikes and former CIO of PayPal and SpaceX. "We've taken a radically different approach to web browsing by developing a highly scalable, enterprise-level client-server application that places the browser outside the firewall rather than on the user's computer (endpoint) – then having it interact with the web browser remotely, providing endpoint immunity to malware attacking through the browser."

Spikes' AirGap Enterprise resides in the network DMZ rather than on end user devices, interposing an "air gap" between the internet and the client applications accessing the web. This true hardware separation stops all malware outside the network firewall, prevents web applications from executing within the enterprise network, and ensures that employee computers remain untouched by malware attacks.

AirGap Enterprise was designed for network integration flexibility, easy management, unparalleled security and sustained high performance under the most demanding user requirements. As such, the client browser deploys easily and requires no prerequisite software while the server runs on hardened, high performance hypervisor Spikes Appliances that offer 11 layers of protection. Spikes Appliances, delivered as physical or virtual appliances, scale linearly and provide automatic load balancing and failover. These in turn, can be deployed on a user's network (a private cloud), on a Spikes network (a public cloud), or on a combination of the two (a hybrid cloud). Further, deploying the easily scalable AirGap Enterprise onto endpoints totally eliminates the risk from client malware attacks while increasing its performance due to the ability to offload the entire workload to the Spikes Appliance(s), or to the cloud, freeing up precious resources on the client device.

"The Spikes approach is pioneering and provides the IT team with a single point of control for corporate browsing, making it far easier for IT to ensure that individuals – intentionally or inadvertently – don't provide an opening for malware to penetrate the corporate firewall. Beyond that, management now has a single point of control to enforce those parts of corporate governance that address concerns related to Internet traffic," adds Mike Karp, VP and Principal Analyst at Ptak Associates.

"The continuing growth of malware and the on-going global initiatives to improve cyber security best-practices affirms the need for our AirGap Enterprise. Spikes has made the hacker's easiest target – the web browser, one of the most impenetrable," concludes Spikes. "We will continue to drive innovation while further establishing our technological leadership in providing the best-in-class cyber security solutions to our continually growing clientele."

About Spikes

Spikes, Inc., founded by former PayPal and SpaceX CIO Branden Spikes, solves the biggest security threat facing enterprise today: browser malware. Employees get hacked by simply visiting infected websites, even legitimate sites, that open a door into a company's networks. Spikes provides the only effective protection from attacks through the browser while still providing a high quality user experience.

The Spikes AirGapTM Enterprise is available for Windows and Mac OS in the current release. Browse fearlessly. For more information, visit www.spikes.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32094
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files.
CVE-2021-32095
PUBLISHED: 2021-05-07
U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files.
CVE-2021-32096
PUBLISHED: 2021-05-07
The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
CVE-2021-32098
PUBLISHED: 2021-05-07
Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization.
CVE-2021-32099
PUBLISHED: 2021-05-07
A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass.