The past half year has been great for Ericom, with record ARR growth, three largest-ever sales contracts signed, impressive product ratings from GigaOM and a bunch of industry awards.
Regulated industries like healthcare and financial services are facing an increasingly complex regulatory environment, including requirements to rigorously protect sensitive data from the risk of exposure due to the growing use of cloud infrastructure and SaaS applications.
Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #10 Server Side Request Forgery
Port scanning is a common first step for hackers seeking websites and apps that are vulnerable to attack. In this video and blog post, we explain how to cloak web app code from threat actors’ prying eyes.
Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #2 Cryptographic Storage and #8 Software and Data Integrity Failures
Bad or missing SSL certificates create both business and security risk, since customers stop cold at warnings that a site may is not secure. Check out the demo of how WAI quickly addresses security, compliance and reputational issues associated with missing SSL certificates.
Addressing the OWASP Top 10 Application Security Risks with Web Application Isolation: #4 Insecure Design
Insecure design is perhaps the most difficult of the OWASP Top 10 security risks to contend with, since it requires going back to the design stage and starting again. But there are ways to protect your app until that can happen.
In this second in a series of OWASP-themed video demos, we attack the Dr. Zero Trust Juice Shop via SQL injection and show how to safeguard your apps from similar threats.
In this first post in a new series, Chase Cunningham introduces his video demo of how Ericom Web Application Isolation protects apps against a directory traversal attack, one common type of broken access control.
In the recent GigaOm Radar report on Secure Service Access (SSA) solutions, the firm distinguishes between repackaged legacy solutions and truly interoperable native SSA. And among the latter, it rates Ericom ZTEdge as a highly innovative platform player that is a market “outperformer”, along with enterprise solutions that cost twice as much.
Regulatory compliance has never been simple but today it is more complex than ever before. Regulations are issued and updated at a dizzying pace, frequently spurred by well-publicized cyber breaches and data leaks – many of which have been traced to outsourced and remote users, working on unmanaged personal devices. How can organizations better manage these risks?