
Safe Browsing & Endpoint Isolation
Browsing sessions and endpoints are the largest, most vulnerable attack surface in your organization. Protect from ransomware, zero-day exploits, and phishing coming from downloads or removable media, with patented containment technology that isolates threats before they can harm the organization. Use our integrated CDR (Content Disarm & Reconstruction) when you need more. Learn More

Endpoint Security Solutions – A BUFFERZONE between Criminals and the Enterprise
For years, the most secure facilities have used the concept of a buffer zone to isolate sensitive operations and information. Now you can use endpoint security software to protect
your enterprise from advanced threats by isolating applications like web browsers and email attachments in a secure, virtual container that prevents exploits from getting in.
BUFFERZONE and Lenovo Offer Customers BUFFERZONE’s Virtual Container Security Solution
BUFFERZONE, a provider of next-generation endpoint security solutions which protect organizations from advanced threats such as ransomware, zero-days and phishing scams, announced today that the company signed a reseller agreement with Lenovo to provide its patented virtual container security solution.

Announcing BUFFERZONE 5.0, with Unique Features for Financial Organizations
Featuring BUFFERZONE Passport, giving organizations the ability to restrict Internet access to browsers protected by BUFFERZONE, opt-in security, read-only social media, and more.

See How BUFFERZONE Passport lets Users Opt-In to a Secure Browsing Experience
Watch how Network Separation with Passport Enforcement allows employees to use the Internet, without putting your organization at risk.

BUFFERZONE has been named the sole winner, as Most Innovative, in the general Security Software category, of the prestigious Cyber Defense Magazine (CDM) InfoSec 2018 award

Preventing the Next WannaCry
The recent WannaCry worldwide ransomware attack seems to have been successfully stopped for now. But what about the next similar attack?