Application Wrapping, Virtualization and Black Hat

Soliton's Virtual Container

Black Hat 2018 is almost here!  Soliton Cyber & Analytics is exhibiting this year in booth #2500 where we will be showcasing our SecureShield product and providing demos on request. Come and see SecureShield’s application wrapping features (aka: Wrapping Box) that won the Interop Tokyo 2018 First Place “Best of Show” Grand Prix Award.  Not attending Black Hat? Not to worry. Here is a brief overview of how our virtual container works.

With traditional virtualization, a hypervisor interfaces with the hardware and each virtual machine possesses its own operating system, binary files (bins), libraries (libs) and applications.

Traditional Virtualization

In a Docker container, the Docker layer and the Host OS replace the Hypervisor layer and each container only has to contain the applications, bins and libraries.

Docker Virtualization

Soliton’s virtual container uses another method. It connects directly to the operating system and binary files, libraries and applications from the host operating system may be accessed by Soliton’s container.  However, the communication is only one way; Soliton’s virtual container blocks all interaction with the endpoint by default. Other local applications may operate in parallel outside of the Soliton virtual container, but interaction with those applications is also blocked. This functionality is available for devices running MacOS, iOS, Android or Windows (7 or 10 only).

Soliton's Virtual Container

For Windows, we have an option that will also allow for application wrapping. This allows a user to launch programs inside a container and is the technology that won the Interop Tokyo 2018 First Place “Best of Show” Grand Prix Award. For files to be downloaded through the SecureShield application from cloud-based applications (OneDrive, Box, etc.) or from internal file servers (a separate option), our technology will allow the file to be edited in the native application (Microsoft Office, Adobe Acrobat, etc.) within the virtual container. This has an advantage over remote desktop or VPN connections in that the connection may be lost and the file will persist on the endpoint – allowing the user to continue working!

If you would like to learn more, drop by Booth 2500 at Black Hat or contact us for a web-based demo.

Meanwhile, as we prepare for Black Hat and its audience of hackers, researchers and IT professionals, we are reminded of six IT security hygiene tips to apply at Black Hat – or basically anytime:

  1. Beware the public network. It is always best to presume that every network and kiosk is compromised and take steps to protect yourself.
  1. Free USB flash drives and other high-end goodies really are too good to be true!  Sometimes they are infected with malware.
  1. Be alert!  Anyone can stick a USB drive into your computer with who-knows-what if you are not paying attention.
  1. Network traffic is easily sniffed, and just as easily spoofed.  Carefully examine available Wi-Fi networks and consider disabling automatic connection. You don’t want to be automatically connecting to faked networks!
  1. Consider turning off Wi-Fi and Bluetooth connectivity on your mobile device. Some cellular recharge stations may also be trying to hack open connections.  Others may be trying to hack you as you walk by.  Even if the hackers are terrible and get nowhere, your battery life will be crushed!
  1. Why help hackers? Always make sure your computers and devices are fully patched and updated. Be sure to delete any sensitive information on your device that you don’t absolutely need.