LOS GATOS, CA--(Marketwired - Jan 27, 2016) - Spikes Security®, the isolation security company, today announced the results of independent testing and validation of the Isla™ Malware Isolation System by two leading independent testing authorities, ICSA Labs and Georgia Technical Research Institute, demonstrating that the award-winning system meets and exceeds the security required to protect against browser-borne malware in today's high threat environment.

According to Bill Gardner, Vice President of Product Management, "Spikes Security is committed to full transparency to enable our customers to gauge the effectiveness of our solution in defeating advanced web borne malware attacks against all of their corporate systems. The security industry is famous for making unproven claims about their ability to foil hackers. We at Spikes believe it is time for industry players to step up and provide fair and unbiased testing of their products on a regular basis."

Isla eliminates browser-borne malware as a major attack vector by processing all web content on secure appliances deployed outside the network, and instantly, continuously transforming all web content -- audio, video, text, and graphics -- into a benign, malware-free format which is presented in an extremely low-latency, natural user experience. ICSA Labs is a division of Verizon that measures product compliance, reliability and performance for most of the world's top technology vendors. ICSA Labs evaluated the effectiveness of Isla's first release in early 2015 to gauge its effectiveness in protecting against advanced web-based attacks.

The ICSA Labs report states: "Isla is proven to protect the client from web browser-borne malware, and is invulnerable to remotely executable exploits known within the information security community. Moreover, it does not introduce vulnerabilities or security-grading mistakes, and does not leak data between virtual sessions."

The Georgia Technical Research Institute (GTRI) is a respected non-profit research institute specializing in testing and evaluation of complex technology solutions, including advanced cyber security systems, and is a trusted government and industry resource and partner. GTRI's evaluation of the second generation of Isla in late 2015 encompassed both rigorous security evaluation and other considerations such as system management, deployability, usability and effectiveness versus competing technologies. Results show that Isla fully delivers on security, offers quick installation capabilities with a well-designed functional management interface, and provides a familiar and functional user experience. Report highlights:

  • "GTRI believes the isolation technology implemented in Isla is effective at preventing the impact of web-based threats to end users."
  • "Installation and setup of the Isla Appliance and Control Center (is found) to be straightforward, with adequate directions provided by the Isla Appliance Quick-Start Guide."
  • "The Isla Control Center interface (is found) to be streamlined and intuitive to navigate."
  • "The Isla browsing experience was not unnatural or awkward."

"Two of the most advanced and thorough testing facilities confirm Isla's 'six degrees of isolation' and re-confirm the enthusiastic feedback we've received from customers and partners," said Michael Mansouri, Spikes Security President and COO. "It's increasingly crucial that IT and C-suite executives demonstrably protect their organizations' most business-critical digital assets, and prevent web malware attacks that might otherwise breach desktop browsers, infect endpoint devices, and allow exfiltration of confidential data and valuable resources. Isla is the answer."

About Spikes Security
Founded in 2012, Spikes Security is focused on delivering secure, scalable, high performance appliance and software solutions that empower businesses with the freedom to safely leverage the web without fear of cyber-attacks. Its flagship offering is a powerful web malware isolation system that prevents all browser-borne malware from entering corporate networks and infecting endpoints, including mobile devices, without requiring installation of any endpoint software. https://spikes.com/index.html.