Read this article on Sandboxing and watch the video of how sandboxing can be avoided through exploits in the Apple IOS: https://www.theguardian.com/technology/blog/2011/nov/08/sandboxing-malware-failureread more
Information technology professionals are compelled to rely on vendors who provide what many so-called experts consider to be best-practices for cyber security. The difficulty is that there has been a significant failure on the part of solutions providers to recognize...read more
The fact is, we have pushed to the limits a more than thirty-year-old computing architecture designed by engineers who never envisioned the Internet or the security challenges that such a globally connected computing architecture would produce. The unpredictable and...read more
If nearly all solutions are attempting to deal with only symptoms and not the real problem, then what is the approach that can get us to genuine secure computing?
Experts, including the National Institute of Standards and Technology (NIST), NSA, DHS and DOD agree that security must be built into computers and applications and not just layered on top of the OS. For this reason, NIST has adopted the patented Vir2us specifications...read more
What makes this approach different from antivirus, firewalls and other so-called advanced threat cyber security solutions?
Antivirus and firewalls are list-based solutions and can only deal with known threats. In today’s world of morphing viruses and malware, these solutions are less than 27% effective. Symantec recently said that their average time to identify threats and update lists is...read more
So many other solutions are in the cloud or in proprietary computer hardware like firewalls. Why secure the network end-points or desktop computers?
Virtually every hack you have read about in the past decade began as a network end-point computer exploit. Endpoints have many vectors for exploits and by making the end-points secure you eliminate the ability of an exploit to propagate across networks and to other...read more
The Vir2us controller is a lightweight client that resides within the kernel and attests the computers bios on boot up to eliminate low-level exploits and corruption. This sealed controller serves up virtual isolated computer environments in containers from pristine...read more
Vir2us creates isolated computing environments. This isolates the file and application being processed from the actual computer system. Either the hacker’s exploit will simply be unable to run or, if it is allowed to run, it will not be able to access any computer...read more
This seems too good to be true. Where did these concepts come from and how do we know they will withstand the test of time?
While the Immunity Platform is novel, innovative and unique in its approach to secure computing, the underlying principles that it employs have withstood the test of time. As an early pioneer of the digital telecommunications industry, I worked for over a decade with...read more