Intelligent CISO Issue 08 | Page 73

By using virtualisation to create hardware- isolated virtual machines (VMs) on each endpoint, organisations can create a virtual wall around critical IP and applications to keep hackers out. www.intelligentciso.com | Issue 08 isolated virtual machines (VMs) on each endpoint, organisations can create a virtual wall around critical IP and applications to keep hackers out. OLIVER OLIVER CANTOR, CANTOR, ASSOCIATE ASSOCIATE DIRECTOR DIRECTOR OF OF PRODUCT PRODUCT STRATEGY STRATEGY AT AT VERIZON VERIZON This secures connections to and from server applications hosting critical IP. In other words, malicious software, hijacked admin accounts or even nation state actors with access to the endpoint’s OS cannot read or write the VMs memory or its keyboard input – preventing threats such as keylogging, screen capture, memory tampering and man-in-the-middle attacks. All of this is invisible to employees, who believe they’re running a simple VDI viewer on their machine. This allows organisations to rest easy about their security and focus on the business, while providing robust and secure access to sensitive and classified assets. As companies have embraced new digital technologies, they’ve opened up more opportunities for greater 73