Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly

    Safe Browsing & Endpoint Isolation

    Browsing sessions and endpoints are the largest, most vulnerable attack surface in your organization. Protect from ransomware, zero-day exploits, and phishing coming from downloads or removable media, with patented containment technology that isolates threats before they can harm the organization. Use our integrated CDR (Content Disarm & Reconstruction) when you need more. Learn More

    Endpoint Security Solutions – A BUFFERZONE between Criminals and the Enterprise

    For years, the most secure facilities have used the concept of a buffer zone to isolate sensitive operations and information. Now you can use endpoint security software to protect
    your enterprise from advanced threats by isolating applications like web browsers and email attachments in a secure, virtual container that prevents exploits from getting in.

    BUFFERZONE and Lenovo Offer Customers BUFFERZONE’s Virtual Container Security Solution

    BUFFERZONE, a provider of next-generation endpoint security solutions which protect organizations from advanced threats such as ransomware, zero-days and phishing scams, announced today that the company signed a reseller agreement with Lenovo to provide its patented virtual container security solution.

    See How BUFFERZONE Passport lets Users Opt-In to a Secure Browsing Experience

    Watch how Network Separation with Passport Enforcement allows employees to use the Internet, without putting your organization at risk.

    BUFFERZONE has been named the sole winner, as Most Innovative, in the general Security Software category, of the prestigious Cyber Defense Magazine (CDM) InfoSec 2018 award

    Preventing the Next WannaCry

    The recent WannaCry worldwide ransomware attack seems to have been successfully stopped for now. But what about the next similar attack?

    • BUFFERZONE is an excellent solution for our employees – it enables them to get the job done, while keeping the network secure.
      Aviv Hasidim, IT Security Manager, NII