Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    EDR‑Freeze: How a User‑Mode WER Trick Can Put Security Agents on Ice and What Defenders Can Do

    By Ran Dubin - CTO

    Tags: prevention, zero-trust, EDR Bypass, EDR-FREEZE Published: October 20, 2025 A new proof‑of‑concept technique dubbed EDR‑Freeze demonstrates how adversaries can exploit Windows Error Reporting (WER) to suspend endpoint protection agents

    Read More >

    Google’s New AI Ransomware Protection in Drive: How to Strengthen It with Containment, CDR, and an AI Vault

    By Ran Dubin - CTO

    On 1 October 2025, Google introduced an AI model in Drive for desktop that looks for behavior consistent with ransomware, then automatically pauses cloud sync and allows users to bulk-

    Read More >

    BUFFERZONE® Safe Workspace® vs. Cato Networks Remote Browser Isolation

    By Ran Dubin - CTO

    Local vs. Remote Isolation: Balancing Security, Privacy, Performance, and Usability Browser isolation remains one of the most effective front-line defenses against browser-borne threats. Two prevailing architectures have emerged: Cato Remote

    Read More >

    BUFFERZONE® Scales AI PC Security Innovation with Microsoft WinML

    By Ran Dubin - CTO

    Overcoming multi-vendor hardware challenges to deliver secure, AI-accelerated solutions for every enterprise. Introduction: What is an AI PC? AI PCs represent the next evolution in computing. Unlike traditional systems that

    Read More >

    Why Leading CISOs Choose BUFFERZONE® for Advanced Endpoint Protection

    By Mor Miller - VP of Business Development

    The High Stakes Every CISO Faces In today’s digital battlefield, Chief Information Security Officers (CISOs) carry an immense burden. A single phishing email, an employee’s careless click, or a cleverly

    Read More >

    BUFFERZONE® Safe Workspace® vs. Zscaler Cloud Browser Isolation

    By Ran Dubin - CTO

    Local vs. Remote Isolation: Finding the Balance Between Security, Privacy, and Performance Browser isolation remains one of the most effective defenses against malware, ransomware, and phishing threats. Two dominant approaches

    Read More >