ADD ZERO-TRUST SECURITY TO YOUR WEB BROWSER.

ENTERPRISE GRADE WEB THREAT PREVENTION DEPLOYED AT THE ENDPOINTS IN SECONDS.

DefensX converts a traditional web browser into a zero-trust secure browser. Zero-trust threat prevention technology protects users from advanced cybersecurity attacks by isolating threats from reaching endpoint devices, such as desktops, laptops, smartphones, and tablets.

EXERTIS IS THE OFFICIAL DISTRIBUTOR OF DEFENSX IN THE MIDDLE EAST AND AFRICA REGION.

Product Packages

  • Core Web Protection
  • Zero-Trust Credentials Protection
  • Core Governance 
  • Core Web Protection
  • Zero-Trust Credentials Protection
  • Core Governance 
  • Zero-Trust File Protection
  • Core Web Protection
  • Zero-Trust Credentials Protection
  • Advanced Governance
  • Zero-Trust File Protection
  • Zero-Trust Web Protection
  • Advanced Reporting
  • Remote Browser Isolation
  • Additional Remote Browser Isolation – Simultaneous Servicing

FEATURES

Use Cases

DefensX applies user-friendly web protection technologies such as threat intelligence and whitelisting, based on the URL risk score so malware/ransomware does not reach the endpoints. DefensX’s solution is a plugin installed in the end users’ browser or an application installed in the end users’ mobile device (IOS/Android).

Remote Browser Isolation (RBI) is a cybersecurity model which aims to physically isolate an internet user’s browsing activity, and the associated cyber risks, away from their local networks and infrastructure. The defined session is executed on the cloud, in a disposable container and the rendered image of the visited page is sent back to the end users’ browser. RBI is the most secure threat isolation technology that currently exists.

  • DefensX is cloud native – it is the first policy enforcer of an application without the need to send traffic to a SWG or CASB.
  • Policies are applied to the applications rather than the network layer. The content is inspected, and policies are defined before the traffic is encrypted. With DefensX, web traffic from cloud to end user remains unmodified.
  • DefensX’s local isolation protects end users with a security layer between the end user and the website.
  • DefensX combines end-user consent, company policies, and threat intelligence to create a personalized cybersecurity posture by leveraging end users’ daily web experience. This unique approach increases cyber awareness, adoption of cyber practices and dramatically reduces the load on cybersecurity professionals.

DefensX’s capabilities are perfect for SaaS access protection. It enables safe access to critical data while using SaaS applications such as MS Office 365, Salesforce, Workday, SAP, etc. DefensX ensures user productivity without compromising potential data leakage.

  • Eliminates the need for any proxy service either on-prem or cloud.
  • Eliminates the need to use VPN or RDP.
  • Avoids complicated network tracking and setup to deliver O365 security services.
  • Reduces latency, reduces costs & improves user experience by delivering protection from native browser.
  • Simplifies onboarding and deployment processes.
  • Prevents against data exfiltration and protects sensitive company critical data while using SaaS applications:
    • Real-time data protection, such as downloads of sensitive corporate data to unmanaged devices.
    • Real-time document sharing protection with 3rd parties or in the organization.
    • Real-time clipboard protection, such as copying & pasting sensitive corporate data.
    • Real-time telemetry data of the user actions such as browser history, shared files, downloaded/uploaded file.

DefensX solves phishing attacks at the right place – the endpoint. It protects the user from entering passwords to unknown and risky sites through a whitelist approach. DefensX mashes up end-user consent, company policies, and threat intelligence to create a personalized cybersecurity posture by leveraging end users’ daily web experience. This unique approach increases cyber awareness, adoption of cyber practices and dramatically reduces the load on cybersecurity professionals.

  • DefensX blocks known phishing sources and risky or uncategorized web pages with read-only mode or blocks them entirely as per policies set by the DefensX policy engine.
  • Prevents phishing links by blocking the password input for the first-time login.
  • Delivers “e-mail click to download” protection.
  • Manages URLs that employees can enter corporate credentials.
  • Keeps track of enterprise’s credential exposure.

ADDITIONAL RESOURCES

DefensX Solution Brief

DefensX Solution Brief

DefenseX Zero Trust White Paper

DefensX Zero Trust White Paper

CONTACT US FOR MORE INFO | REQUEST A DEMO

    NAME

    EMAIL

    MOBILE NUMBER

    COUNTRY

    PRODUCT

    REQUESTING

    ADDITIONAL INFORMATION


    Learn how your data is processed.