SHARE
Facebook X Pinterest WhatsApp

Spikes Security Unveils Web Gateway to Isolate Malware

How to Navigate the Common Pitfalls of Security Policy Management Spikes Security, a startup company headed by the former technical lead of PayPal, Tesla and SpaceX, this week unveiled an Isla appliance specifically designed to isolate malware from the end-user computing environment. Spikes Security CEO and CTO Branden Spikes says the Isla appliance takes advantage […]

Written By
MV
Mike Vizard
Jul 2, 2015
Slide Show

How to Navigate the Common Pitfalls of Security Policy Management

Spikes Security, a startup company headed by the former technical lead of PayPal, Tesla and SpaceX, this week unveiled an Isla appliance specifically designed to isolate malware from the end-user computing environment.

Spikes Security CEO and CTO Branden Spikes says the Isla appliance takes advantage of advances in remote networking, virtual machines, JavaScript, HTML5 and a new transport mechanism to render content on an appliance rather than on the local machine where a Web browser is actually running.

Given the fact that most lethal malware these days is bypassing the network perimeter to execute directly within a Web browser, Spikes says it is clear there is a need to find a way to isolate end users from potential malware. To accomplish that, any Web code actually winds up being executed on the Isla appliance, which end users then log into over an Air Gap transport developed by Spikes Security.

While Spikes concedes that this idea is not especially new, it’s never been widely adopted because all previous attempts comprised the end-user experience. In contrast, Spikes says Isla solves the problem by providing a Web gateway running on a Linux appliance that actually renders content, including video, audio and graphics, at scale faster than a local browser running on most endpoints can.

IT organizations can still opt to pass certain Web traffic they trust directly on to a browser, or use Isla to eliminate access to Web sites that are known to distribute malware. In either case, Spikes says it’s up to the internal IT organization to decide what mix of white and black listing they want to employ.

More often than not, the way to solve an intractable issue requires the right set of technologies to come together in just the right way to create a slightly different approach to address the root cause of the problem. Spikes freely admits that when it comes Isla, Spikes Security is standing on the proverbial shoulders of giants that have gone before. The difference now is that all those shoulders are finally leaning in the same direction to isolate malware once and for all from the end-user computing environment.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.