It’s been a while since my last post but I’ve been finalizing a product which puts all of the content in the Security Through Process Isolation posts into action. The product, now in beta, focuses on web browsers, the most common set of browsers in particular. While the infrastructure of the product can be applied to any process or set of processes, the current beta release will only isolate the following browsers:
- Internet Explorer (Edge, aka Spartan, is currently not supported but in the works)
- Chrome
- Firefox
This set will be extended in the future but we are focusing on these for the time being.
The areas which are covered in the current beta drop of the product include:
- File system isolation – Security Through Process Isolation Parts 2, 3 and 4
- Registry isolation – Security Through Process Isolation Parts 5 and 6
- Handle mapping access control – Security Through Process Isolation Part 7
- Named pipe obfuscation – Security Through Process Isolation Part 7
The testing over the past 6 months has shown complete protection from basic malware which you download via web browsers as well as more advanced designs which attempt to control or manifest itself on the local system. If you’re interested in taking it for a spin, you can download the beta version at Vector Shield. Remember, the product is in beta so YMMV …
Leave a Reply
You must be logged in to post a comment.