Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    What You Should Know About Browser and Endpoint Isolation

    By BUFFERZONE Team, 24/05/2023

    Web security is of paramount importance in today’s digital landscape. Browsers enable access to various types of online resources like websites, digital media, and cloud-based services. However, this also makes

    Read More >

    Safe Workspace®Empowering Enterprise Browser

    By BUFFERZONE Team, 23/05/2023

    The rise of cloud services and digital transformation has changed the traditional approach to network and endpoint security. The ability to communicate quickly, access SaaS applications, and work from home

    Read More >

    ISO 27001 (2013) and How BUFFERZONE Customers Benefits from It

    By BUFFERZONE Team, 4/05/2023

    Target tag: Product Tags: Certification, ISO, Phisical Seccurity, Cloud Security ISO 27001 (2013) is an international standard that outlines the requirements for an information security management system (ISMS). It provides

    Read More >

    What Is Content Disarm and Reconstruction?

    By BUFFERZONE Team, 4/05/2023

    Tags: Malware Analysis, CDR, Zero-Trust, Detection  Audience Tag: Feature Spotlight  Over 92% of cyber-attacks start with seemingly harmless emails or links? According to a report [1], the number of malicious

    Read More >

    Sophisticated Phishing Attacks Alert – How BUFFERZONE Can Stop It 

    By BUFFERZONE Team, 23/04/2023

    Microsoft has issued a warning regarding a new phishing campaign aimed at accounting firms and tax preparers, which involves the use of remote access malware to gain unauthorized entry into

    Read More >

    MITRE ATT&CK® mapping and how it contributes to the users

    By BUFFERZONE Team, 15/03/2023

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) is a comprehensive knowledge base and model for cyber adversary behavior. It reflects the various phases and steps an adversary may

    Read More >