Droplet
Computing today
announced that a recent penetration test failed to break into its
patent-pending Droplet Computing container solution. The independent testing
was undertaken by NCC Group
plc.
Today, many applications run on
insecure operating systems. The Droplet Computing container totally eradicates
this vulnerability by deploying those applications on a modern, patched system without
change, thus removing any security threat.
NCC reported, "The system being
assessed allowed organisations to run existing applications within a secure
containerised environment within a browser. The portability of running in a
browser would allow these organisations to decommission unsupported and
vulnerable operating systems in place of fully updated and supported versions,
while still being able to use production software."
"Many organisations' existing
applications are business critical and, in many cases, cannot be "webified" or
otherwise modernised. Thus, companies continue to run their businesses with a
large element of keeping their fingers crossed," stated Peter von Oven, founder
and CTO, Droplet Computing. "By allowing organisations to continue to use these
applications by securing them in our container technology, Droplet Computing is
delivering the holy grail of utilising existing apps securely."
The assessment was conducted from
February 14 to February 18, 2019 on a Windows 10 laptop with two Droplet
Computing containers, one containing Windows XP, with a variety of outdated
software, including Office 2010, and the other with Kali Linux containing a
large number of malicious tools useful for breaking out of the container. The
main outcome of the report was that the container service was not accessible
remotely, a huge advantage for organisations in securing enterprise
applications.
Droplet Computing is now using
these results and working with NCC and Public Sector clients to achieve
Cyber
Essentials PLUS accreditation. Cyber Essentials is a
Government-backed, industry-supported scheme to help organisations protect
themselves against common online threats.