Access the web fearlessly, without risk to your enterprise.
Spikes has developed revolutionary technology which makes it safe to use the web. With true hardware separation, Spikes Browser isolates web applications from executing within your enterprise network. With the right recipe of bulletproof security, state-of-the-art performance, and ease of use, we've made the hacker's easiest target one of the hardest targets.
Spikes Browser is a remote application, running on an an appliance in the cloud. Instant-launching browsers, true hardware separation, low-latency remote display, secured clipboards, downloads, and printing. A unified experience across devices. Purpose-built for ease of deployment, ease of use, scalability, and security. No more false sense of security.
Security & Performance, without sacrificing Convenience.
Our remote display technology provides a superior level of performance while maintaining an intuitive user experience for even the most demanding users. The client software is lean and requires no required extensions, plugins or runtimes. Spikes Appliances scale linearly and provide automatic load balancing and failover.
Our unique solution, with its layers of security and a hardware-separated design, makes our users virtually immune to malware. Native support for private, public, and hybrid cloud deployments provides unparalleled privacy and peace of mind. This design provides a level of protection far exceeding anything available with existing browser security technologies.
Spikes Browser was designed from the ground up to be easy to use, deploy, integrate, and be compelling for users and administrators alike. Simple installation of the client makes start-up a snap! Our user interface is intuitive, portable and enables your users to be more efficient.
Use the web fearlessly, as it was intended to be used.
Our unique approach and technology have leapt ahead of cybercrime and changed the game. Now you can leave popups, cookies, scripts, and advanced controls enabled, they can’t hurt you. By using the Spikes Browser, you’ve made web malware irrelevant. Our patent pending technology provides sophistocated, multi-layered intrusion prevention.
Switch between your devices seamlessly, preserving open tabs and windows, mid-stream. A user can be watching a YouTube video on his/her notebook, then switch to the PC, then back again with every change being instant, seamless, and without interrupting video playback. Favorites, bookmarks, cookies, and other user profile preferences are maintained consistently between devices.
By using a video codec to deliver the browser content to the endpoint device at its resolution, we are able to optimize bandwidth usage on page load. For example, the overall bandwidth consumption of the YouTube homepage is reduced to a third of normal by using the Spikes Browser. This results in a faster user experience of the full featured web, which is particularly great for devices on low-bandwidth connections.
The workload of running a web browser on a computer or mobile device is significant, and can (and often does) have a negative impact on overall performance by using up precious memory and CPU resources. The Spikes Browser offloads this entire workload to the cloud, freeing up precious resources on the client device and speeding them up as a result.
As a result of saving downloads in the cloud instead of directly to client systems, we can first scan downloads for viruses and then apply policy to determine whether the download is permitted, pending approval, or denied. This capability to keep untrusted downloads in a quarantined approval queue is an additional level of control not previously available to IT departments.
We anticipate your need to maintain traditional browser support, and to tiptoe into the pool with a gradual deployment of Spikes technology. To facilitate this with the utmost convenience, we provide full backward compatibility with traditional browsers and web applications within the same user experience.
Spikes Browser is the only secure web browser. We have developed remote application technology which makes it safe to use the web, by running browsers on appliance-based cloud VMs. Our users have complete fearlessness of web malware, without the loss of performance and functionality typical of security products today.
Spikes Browsers are virtualized on remote systems with true hardware separation, hardened, and actively defended, so when malware strikes, your computer remains untouched. On any computer or mobile device, this approach protects against all sorts of threats, even the unknown and undetected.
Spikes Browser is a client/server application. The client is lightweight and easy to deploy automatically, and requires no prerequisite packages. The server runs on hardened, high performance hypervisor hardware called Spikes Appliances. These Spikes Appliances can be deployed on your network (private cloud), on our network (public cloud), or a combination of the two (hybrid cloud).
Spikes Appliance is a purpose-built, high performance server offered by Spikes to provide an optimal hardware platform to run Spikes Browsers. They come in various sizes and configurations, can scale linearly, automatically failover and balance load, and provide the maximum performance per dollar to meet the necessary deployment requirements of IT departments.
While VDI offers IT organizations a centralized, efficient, and easily maintained way of scaling operations and responding quickly to the changing needs of their business, VDI is not purpose built to solve security. As a result, VDI browsers are not more secure, and still suffer many of the same risks of traditional native browsing. In VDI environments, we recommend deploying Spikes Browsers in the VDI farm to add the necessary security for its users.
Some other key advantages of Spikes Browser vs VDI:
Furthermore, Spikes Browser complements VDI environments nicely by reducing the load on your VDI environment. Every Spikes Browser is one less VDI browser, providing potentially huge savings and greater scalability for your VDI.
Virus scanners protect against known viruses, and known virus behaviors, but don’t protect against new viruses and behaviors that aren’t known yet. Recent studies suggest that over 10,000 new malware programs are written every day, and that it takes an average of 20 days to discover malware infections.
Though Spikes Browser is vastly superior protection against browser threats, we still recommend AntiVirus scanning on devices where files can potentially make their way to your PC through other means (USB thumbdrives, email attachments, etc.).
Note: All files downloaded through Spikes Browser are scanned by our integrated AntiVirus engine.
Sandboxes are intrinsically unsafe, perpetuate a false sense of security, and get hacked all the time. We refer to them as litterboxes.
With Sandboxing you’re relying on a single piece of software to stand between you and malware infection. If that software fails or has flaws, attackers can get right in. When there is no hardware separation from the malicious software and the shared physical memory, exploits can provide elevated privileges, code execution, and direct access to your sensitive information.
In the recent Pwn2Own hacking competition in March 2013, Internet Explorer, Firefox, and Chrome all got hacked on the first day. Chrome’s sandbox was fully breached. Computers running Java are extremely vulnerable to local web browsing and sandboxes provide no protection against Java exploits.
For the maximum degree of security, we recommend configuring your network to block direct access to the web for user devices. If only Spikes Browsers can be used to surf the web, all potential browser threats become mitigated.
It is a common misconception that XSS vulnerabilities are a browser vulnerability, so it is the website developers charged with the sole responsibility for preventing XSS exploits from circumventing their website security measures. That said, Spikes Browser does provide countermeasures such as those provided by traditional browsers. For example, by preventing cookies from being accessed by websites that did not issue them.
No problem, Spikes Browsers can be configured to allow easy access to your trusted websites through the traditional browsers by policy.
Spikes does not have backdoors into your network or devices, does not collect any sensitive information, and provides maximum privacy.
Our engineers are improving things faster than our writers can update this website, so for the latest information, and a really excellent conversation with cool people, please contact email@example.com.
A collection of pertinent downloads to get educated on browser security:
Spread the word. Save the world (wide web).
We're a US based information security technology company founded by our residing CEO, Branden Spikes— the former CIO of SpaceX and PayPal. Our aim is to counter the false sense of security in the computer security industry by creating uniquely effective security solutions. In our fight against cybercrime we're ambitiously striving to solve one of the world's most pressing problems.
We have a great one.
Branden Spikes is one of a rare species, the Silicon Valley native. He began at the epicenter of the Information Age boom, developing internet services even before there was a World Wide Web. As a teenager he was among the pioneers of Massive Multiplayer Online Gaming, running a MUD and captaining a world class competitive Quake team. Spikes was recruited by Elon Musk, while consulting for a network security firm in 1997, to architect his network systems. Over the last 15 years Branden has been CIO, computer security guru, chief IT guy and has architected many great infrastructures along the way, including those for the startups PayPal and SpaceX, whose networks have never been hacked.
Scott Bennett has made a career out of inspiring those around him to deliver the seemingly impossible. He has been directly responsible for deploying end-to-end comprehensive solutions for a variety of applications, from a Seattle-based tech giant to some small Hollywood media houses— and the list goes on. Bennett's leadership skills stem from a unique blend of experiences ranging from military service, to senior management experience, to product development time. His agile management methodology has been instrumental in reducing our time to market and his laser focus drives our vision. Like a genie uncorked, Scott grants wishes to Spikes Inc. on a daily basis.
Scott Alexander has been a tech entrepreneur since his days studying Business and Computer Science at UC Berkeley. Recruited early on by Elon Musk, he was among the first ranks of the PayPal Mafia and was critical in coding what we know today as the safest way to pay online. With one success story under his belt, Alexander turned his entrepreneurial spirit loose— demonstrating his expertise as a coveted business adviser. Scott's insight into technology and his steady head for business make for an operations officer bar none.
The big smile and infectious laugh of John A. Rees are no strangers to Silicon Valley. Rees' twenty-plus years of Sales excellence have continued to open doors and expose the world to the idea of a 100 percent safe web. With extensive experience in channel sales and a laser focus on game-changing products that "make a difference", John brings that infectious enthusiasm to all that we do. The "Spikes Experience" has been personally shaped by Rees— with him, the client is always number one.
Edmund Cronin has done extensive planning with strategic partners to locate companies who have been patiently waiting for the the "Spikes" web solution. With more than twenty years of experience in sales and marketing, Edmund has taken protecting the world from malware to heart and is doing all he can to give "Spikes" the voice it deserves. His vast experience and deep understanding of our distributer and channel markets have proven invaluable to the "Spikes " vision.
Get the latest news about Cyber Security
We are happy to help get you started! Contact us using the form below or give us a call, and follow our feeds. You can also subscribe to our newsletter to stay tuned.
500 West Hamilton Avenue #110458
Campbell, CA 95011-0458
Our social feeds provide actionable intel, updates on our progress, and relevant security news.