Bufferzone uses a unique approach to protecting the endpoint. Rather than detecting threats and blocking them, it simply contains them. It places endpoint applications - those that either housed at the endpoint such as browsers or those that execute on the endpoint as client-server applications - into a secure container. The container spins up automatically when the application is launched. Browsers, for example, launch with a red border, indicating that they are contained. Applications that are considered "safe," launch with a green border. This ensures that the user knows they are protected. The exception is email. Email launches with a yellow border and that tells the user that the email and any attachments are tagged and protected. The tag is persistent.
展开▼