Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Bufferzone Hooks Into Windows to Containerize Security

    Written by

    Sean Michael Kerner
    Published December 23, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The idea of using isolation techniques—such as a sandbox or a hypervisor—to limit the attack surface in an operating system or a piece of software is not a new one, but it is an evolving space with innovations. One of the vendors using isolation to limit security risks is Bufferzone, which is using its own proprietary container approach to help protect users from threats.

      “We allow companies that have levels of security requirements to connect to the Internet safely,” Israel Levy, CEO of Bufferzone, told eWEEK.

      The company has raised approximately $10 million in funding to date, with plans to raise more funds in the next six months, Levy said.

      Bufferzone’s technology segregates all the activity that is done over the Web by running it within a secure container. The idea is that if there is malware, it will be restricted and limited by the boundaries of the container and not have a wider risk or impact for organizations.

      The term “container” is often associated in the modern computing world with Docker; however, that’s not the container technology that Bufferzone is using.

      “Our approach is completely designed for security and is a proprietary technology that is very lightweight,” Eyal Dotan, CTO and co-founder of Bufferzone, told eWEEK. “It contains file system and registry modifications, but processes still run on the same machine, isolated by our windows kernel driver.”

      Bufferzone’s container hooks into the Windows kernel directly, which Dotan said provides an advantage of user-mode forms of security. Programs that are in the buffer zone cannot access processes outside of the buffer zone. The way Windows works, a process needs to be accessed in order to inject code or to read what is running.

      “Given that we’re in kernel mode, we see everything that is coming though our driver,” Dotan said.

      Users still can get access to the underlying file system, by way of an approach known as “copy on write.”

      “We let processes in the buffer zone see what’s on the file system,” Dotan explained. As soon as a process requests write access for creating or modifying something, we simulate that operation in our own repository.”

      For a file system operation, there is a redirected file directory, and for the Windows registry there is a redirected registry key. The Bufferzone repository contains the delta, or the differences over time, of modifications made. Existing applications continue to work inside the Bufferzone since the technology resides in the Windows kernel and is not application-specific, Dotan said.

      Among the many companie that compete with Bufferzone is Bromium, which provides a virtualization, or microvisor-based approach to securely isolating a system. Levy noted that his company will often compete on deals with Bromium.

      Bufferzone is now making its technology available for Windows 10 users and is looking to expand the platform in 2016. Levy said that one area he’s looking at is offering Bufferzone through a managed security service provider (MSSP) model.

      “The technology will continue to be deployed by large accounts by companies with over 100,000 employees,” Levy said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×