Ringfencing

☂️ Meets cyber security insurance requirement

What is it?

Ringfencing controls what applications are able to do once they are running. By limiting what software can do, Ringfencing can reduce the likelihood of an exploit being successful or an attacker weaponizing legitimate tools such as PowerShell or Microsoft Office.

RingfencingTM allows you to control how applications can interact with other applications. For example, while both Microsoft Word and PowerShell may be permitted, Ringfencing will prevent Microsoft Word from being able to call PowerShell, thus preventing an attempted exploit of a vulnerability such as the Follina vulnerability from being successful.

Why it's important?

Under normal operations, all applications permitted on an endpoint have the same access as the operating user: data, applications, the network, and the registry. If compromised, an attacker can use the application to steal or encrypt files, abuse legitimate tools, communicate with malicious IPs, and make changes to the registry. Ringfencing allows you to create boundaries to permit applications access to only what they need.

How it works:

Puma implements a plan to deploy and install Ringfencing across your organization’s endpoints. Once installed, these endpoints will automatically be configured to apply a policy to a list of known applications such as Microsoft Office, PowerShell, Teams, and many more typical applications. The default policies aim to provide a baseline level of protection for all endpoints. Puma then updates your policies, creating and changing to fit your organization’s needs without compromising security.

What are the benefits?

Mitigate against Malware

Stop fileless malware by limiting what applications are allowed to do.

Granular App Policies

Stop applications from interacting with other applications, network resources, registry keys, files, and more.

Limit App Attacks

Limit application attacks like application hopping by limiting what applications can access.

Limit Access To Your Files

The average computer has over 500 applications, and only a handful of those need to access your files. With Ringfencing, you can choose which applications need to see which files.

Have questions about cyber security?

Let's reduce risk together

Contact us

42
entitlements to explore

Learn more about PUMA's Core, Core+, and Complete entitlements. Click one and learn how they work, why they are important, and their benefits.

Service Desk Core entitlements
Support For Your Staff

Service Desk Core

Supporting Your Technology

Service Desk Core

5 Ways We Support You

Service Desk Core

Access to Engineers

Service Desk Core

Fast SLA Guarantee

Service Desk Core

Asset & Inventory mgmt.

☂️ Meets cyber insurance

Account Management Team

Service Desk Core

Procurement & Sales

Service Desk Core

IT Strategy with vCIO

Service Desk Core

Identity Management

☂️ Meets cyber insurance

Security & LoB patching

☂️ Meets cyber insurance

Data Encryption Support

☂️ Meets cyber insurance

MFA Support

☂️ Meets cyber insurance

Vendor Management

☂️ Meets cyber insurance

Web traffic & Content Filter

☂️ Meets cyber insurance

NGAV - Virus License & Support

☂️ Meets cyber insurance

EDR & MDR license & Mgmt.

☂️ Meets cyber insurance

Security Baseline for Endpoints

☂️ Meets cyber insurance

PBX & Phone systems

Service Desk Core

Microsoft 365 Support

Service Desk Core

Network Support

Service Desk Core

License & SaaS mgmt.

Service Desk Core

ISP & Internet Mgmt.

Service Desk Core

Service Desk Core+ additional entitlements
Phishing Simulation

☂️ Meets cyber insurance

Vulnerability & Pen Testing

☂️ Meets cyber insurance

Security Awareness Training

☂️ Meets cyber insurance

DNS Advanced Filtration

☂️ Meets cyber insurance

Dark Web Filtration

☂️ Meets cyber insurance

Password Manager for Staff

☂️ Meets cyber insurance

HIPAA Platform & Mgmt.

☂️ Meets cyber insurance

Security Risk Assessment

☂️ Meets cyber insurance

Application Whitelisting

☂️ Meets cyber insurance

MDR + 24/7/365 SOC

☂️ Meets cyber insurance

Network Control

☂️ Meets cyber insurance

Ringfencing

☂️ Meets cyber insurance

Elevation Control (PAM)

☂️ Meets cyber insurance

Storage Control

☂️ Meets cyber insurance

Service Desk Complete
On site visits

Service Desk Complete

Unlimited Projects

Service Desk Complete