The computer is part of our daily environment, both professional and personal. We often forget that it is vulnerable to attacks by cybercriminals. We think we are protected until the day when, by opening an attachment we think is harmless or by following a link out of curiosity, our machine becomes infected with malware that will cause irreparable damage, including the theft of sensitive data or ransom demands. The UN estimates that cybercrime will cost $5.2 trillion between 2020 and 2025 worldwide.
Let’s take the example of the TrickBot botnet, it has been active since 2016 and Microsoft thought it had been eliminated by a court decision. Even if it is coming back discreetly compared to its initial scope where it had infected thousands of devices. It is now targeting mainly legal and insurance companies in North America. It is a ransomware claiming Bitcoin ransoms to avoid any traceability.
Faced with the constant evolution of cyber-attacks such as ransomwares and botnets, which are constantly innovating to infect workstations, it is essential to have centralized management of one’s computer equipment, and reactive in real time in order to be able to react on all machines in a simplified manner. Wisper is working with its Research and Development department to offer the most efficient solution in the field of virtualization.
With the ceBoxOS®, it becomes possible to restart workstations on a clean environment basis in a very short time, if a cyber attack occurs. Moreover, the centralization of desktop management facilitates the application of security updates and patches in a few minutes on all desktops. The ceBoxOS® solution is not an intrinsic security solution, but it is compatible with all security software and firewalls and contributes to an efficient fight against cyber-attacks.
We have developed the Read Only mode which allows to find a workstation immune from any virus at each reboot, which guarantees an always optimum performance of the machines.
The Read Only mode corresponds to a non-persistent instance of the master, which means that the workstation at its startup will be the image of its master.