Ericom ZTEdge Named "Outperformer" on GigaOM Radar – Click Here! Learn How Web Application Isolation Secures 3rd Party/Unmanaged Devices – Click Here! Ericom Software and ZTEdge Win 5 Global InfoSec Awards – Click Here!

 

Secure Virtual Meetings from
Web-based Threats

Virtual Meeting Isolation secures the web interfaces of apps like Zoom and Teams, addressing vulnerabilities and providing data-sharing controls that prevent the inadvertent leakage of sensitive information.

Your Challenge:

Virtual Meetings Expose Networks and Data to Cyber Risks

bug icon

Data Loss

bug icon

Compromised Endpoints

bug icon

Malware

bug icon

Uninvited Attendees

Use of virtual meeting platforms like Zoom, Microsoft Teams, and Google Meet have become the norm in most organizations. In the new distributed work environment, these tools are a key part of how teams stay connected.

Unfortunately, these tools have created new security vulnerabilities that need to be addressed. For example, cyber criminals have focused their attention on these solutions and launched new attacks targeted on stealing shared data, gaining access to internal IPs of attendees and their devices, delivering malware through infected links in chats, and attending meetings to gather corporate intelligence. Forbes covered the annual Pwn2Own competition which proved how vulnerable Microsoft Teams and Zoom are.

Perhaps just as concerning to CISOs and CIOs is the limited security controls these apps have, which opens the door to employees inadvertently sharing sensitive information within virtual meetings, either in chat, screen shares, or even via their cameras in their background images and desks. While the client applications of Zoom and Teams provide some control, the security policies of many organizations do not permit client-side software to run on their devices. As a result, with no ability to address these security concerns, many companies have been forced to limit their use of these key meeting solutions.

Our Solution:

ZTEdge Virtual Meeting Isolation: Complete Protection from Cyber Threats

bug icon

Isolate Web Portals

bug icon

Cloak IP Addresses

bug icon

Restrict Content Sharing

bug icon

Prevent Intrusions

ZTEdge Virtual Meeting Isolation (VMI) is an innovative solution that preserves all virtual meeting functionality while protecting organizations from potential cyberattacks targeting tools like Zoom and Teams while also providing controls to address inadvertent data loss/exposure by legitimate users of these solutions. VMI supports the web portals of virtual meeting solutions and requires no agents or software to be deployed on devices.

ZTEdge VMI renders the web portals of apps like Zoom in remote, isolated containers in the cloud. This approach delivers a standard virtual meeting experience for users, while empowering IT and Security teams with a number of powerful security controls:

  • The virtual meeting activity of each participant can be controlled:
    • Limit who can share screens or use cameras and microphones
    • Determine who can upload and share files
    • Select which users can engage in the chat box
  • The IP addresses of connecting endpoints are not exposed
  • Any web links shared in chat will be rendered in isolated environments ensuring that malicious sites/links do not compromise endpoints
  • File uploads/downloads can be scanned for malware with CDR or data loss with DLP
  • Prevents unauthorized, malware-enabled recording of virtual meetings

This innovative patent-pending solution isolates virtual meetings so organizations can conduct business securely without interruption.

Why ZTEdge?

Simple, affordable Zero Trust capabilities in a single integrated cloud platform

bug icon

Simple

bug icon

Comprehensive

bug icon

Affordable

ZTEdge is a Secure Access Service Edge (SASE) platform that cuts complexity, reduces cyber-risk, and improves performance, at half the cost of other Zero Trust solutions. ZTEdge delivers a comprehensive set of Zero Trust security capabilities via a high-performance, resilient cloud platform. A cloud-native architecture and flexible global PoP infrastructure make ZTEdge highly efficient, allowing us to pass significant cost savings along to our customers.

Let us accelerate your move to Zero Trust.

Contact Us

ZTEdge logo with tagline