When the health department does research ...
One example is the health department. Kay Hirschfeld, an administrator in Dresden's municipal government who is responsible for cybersecurity, identifies sensitive areas where the employees must be able to do research securely. For example, they must be able to contact sex workers to carry out information campaigns. They must be able to access forums for same-sex partners, for example to draw attention to the possibility of free and anonymous AIDS tests. In all cases, personal data must be encrypted and pseudonymized, and data protection and deletion deadlines must be complied with. In particular, online research activities must be separated from the internal system so that nobody can use the browser to access the operating system on which personal data is processed.
The situation with weapon registration is similar. Until recently, the weapon offices (around 550 in total) used a wide variety of systems to maintain their data, in some cases on index cards instead of digital. When, due to the associated EU directive, the data of all the offices had to be consolidated, which means harmonized and stored in a central system, the risk increased. As Hirschfeld explains, "Then, from a single gateway, hackers could access data of an entirely different quality and perhaps even an entirely different quantity of data." An important aspect for the IT security expert is that despite the encapsulation of their own operating system, transactions with the internet run almost just as fast as with a normally protected system. With the right configuration, it even loads unobtrusively when Windows starts up.
Multilayer security is the key
The operating system and the intranet remain completely separated from the web browser while the application is running. Telemetry data is no longer sent to the producer. This is metadata about the document, the client concerned and its usage. Along with this information, confidential data could also be grabbed without being noticed. The browser runs on a completely virtualized platform with no noticeable impact on users, because their browser behaves as expected. The "Docs in the Box" feature also allows email attachments, which could contain viruses, to be viewed safely in the preview window of a virtualized environment.
The key to this is a hardened Linux system. Schulz explains: "The open source operating system is stripped down so that only the browser can run on it." In addition, data traffic is encrypted end-to-end by a VPN tunnel using the R&S®Trusted VPN gateway. As Schulz points out, no other vendor in the world offers this sort of complete network and browser encapsulation with retention of full functionality.
The human factor
With R&S®Browser in the Box, individual authorized users are freed from the responsibility of personally checking each single site. Nevertheless, Kay Hirschfeld from Dresden warns, "The biggest danger is not hackers, but careless, perhaps even disgruntled, employees with appropriate access rights." Technical solutions are powerless against spies who smuggle data out of the company, but without a technical solution you have lost before you even get started.