Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Why Cyber Criminals are Targeting Higher Ed – and How to Fight Back

    By BUFFERZONE Team, 25/08/2016

    In the “good old days”, the biggest hazards facing higher education institutions were those ever-present trio of: dwindling enrollment, lack of alumni support and government funding cuts. However, for today’s

    Read More >

    Banking Cybersecurity: A Smarter, Simpler and Sustainable Approach to Network Separation

    By BUFFERZONE Team, 28/06/2016

    Banks. Investors love them, governments support them, businesses rely on them, and over the course of their lifetime individuals probably use them more frequently than any other type of professional

    Read More >

    How Hospitals Can Protect their Network from Surging Malware Attacks

    By BUFFERZONE Team, 11/04/2016

    In the “good old days”, the only kind of viral infections that hospitals had to deal with were those involving patients. But today, hospitals themselves are under siege – except

    Read More >

    5 Ways an Application Sandbox Protects Endpoints, Users & Networks

    By BUFFERZONE Team, 22/03/2016

    For years, banks, airports, government buildings, and other secure facilities have used zone-based physical security (a.k.a. “buffer zones”) to keep assets safe. Yet, what happens when the context shifts from

    Read More >

    Macro Malware Strikes Again – and How You Can Avoid Getting Hit

    By BUFFERZONE Team, 3/02/2016

    In their quest to hack as many victims as possible while expending the least amount of effort, some cyber criminals have decided that instead of creating sophisticated and complex new

    Read More >

    Malware Mania: the More Things Change, the More They Stay the Same

    By BUFFERZONE Team, 26/01/2016

    The startling headlines scream out like something from the front page of a supermarket tabloid: “Terrifying New Malware on the Loose!”, “First-Ever Cyber Menace Spotted in the Wild”, “Cyber Criminals

    Read More >