Today's Deep-Dive: Kasm
Ep. 263

Today's Deep-Dive: Kasm

Episode description

The deep dive discusses Kasm workspaces and container streaming, a technology that allows users to run secure environments remotely via a web browser. This approach, based on containerized desktop infrastructure (CDI), is more efficient than traditional Virtual Desktop Infrastructure (VDI), offering faster boot times and better resource management. The technology uses Linux containers to provide isolated, disposable environments, enhancing security by keeping potentially harmful activities away from the user’s device. This method supports various use cases, from protecting everyday users like realtors to enabling secure, anonymous browsing for threat intelligence analysts. The platform is flexible, open, and designed for easy integratioactivepiecesn into existing IT workflows, supporting compliance with regulations like SOC 2 and HIPAA.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now for 1 Euro - 30 days free!

Download transcript (.srt)
0:00

Before we really dive in today, just a quick word about the supporter who helps

0:04

make this possible.

0:05

SafeServer. They're dedicated to hosting software like the kind we're discussing

0:09

and

0:09

supporting your digital transformation. You can find out more at www.feserver.de.

0:18

Okay, so let's unpack this. We're looking at something today that's, well, it's

0:24

really

0:24

changing how we think about using computers, especially when security is a big deal.

0:29

Imagine

0:29

this, what if your desktop or even just your web browser wasn't actually running on

0:34

your physical

0:34

computer? Exactly. Instead, it's running somewhere else securely and just streamed

0:39

to you. We're

0:40

talking about Ketham workspaces and this idea of container streaming. Right, so you

0:43

open a browser

0:44

tab and boom, there's your secure environment. That's the core idea. And for anyone

0:48

listening

0:49

who's curious about secure remote access but maybe finds the tech talk a bit much,

0:52

things like zero

0:53

trust or containerized desktop infrastructure, our mission today is pretty simple.

0:57

We're translating

0:58

it, right? Making it clear. Exactly. We want to give you a clear, practical

1:02

understanding of what

1:03

this means and why it matters. It's sort of a shortcut into this next wave of

1:07

remote computing.

1:08

And the big takeaway really seems to be this. Whether it's a browser, an app, or a

1:13

full desktop,

1:14

it gets streamed to whatever device you have, wherever you are. Your laptop, your

1:18

tablet.

1:18

It almost doesn't matter for security. That's the promise. The device becomes less

1:23

important than the

1:24

secure access itself. Okay, let's dig into the basics then. We've heard of VDI

1:28

virtual desktop

1:29

infrastructure for years, but the material we looked at really emphasizes that Chasm

1:35

uses

1:36

something different. A workspace streaming platform based on containerized desktop

1:42

infrastructure or

1:43

CDI. Why is that difference so important? Well, think of it like this. Old VDI was

1:47

maybe like

1:48

needing a whole separate car for every single trip you take. Each user needed a

1:52

full copy of

1:53

the operating system, like Windows. Super heavy, resource intensive. Right, I

1:57

remember those being

1:58

slow to start up. Exactly. CDI though uses Linux containers. It's much more

2:02

efficient. Think more

2:03

like a modern hybrid car using a shared engine efficiently. So everyone's using the

2:07

same core

2:08

engine, the Linux kernel, but they get their own isolated space. Precisely. You

2:13

share the underlying

2:14

kernel, which saves a ton of resources, compute, memory, disk space, and this leads

2:19

to two huge

2:20

advantages. Speed and efficiency. We're talking desktops booting up in seconds,

2:26

literally seconds.

2:27

Not minutes like the old VDI. No way. And that efficiency, that speed, is what

2:32

makes it practical

2:33

for these workspaces to be, well, disposable. You can create one instantly and

2:37

destroy it just as fast.

2:39

And that disposable aspect is key for the security side, which I definitely want to

2:42

get into.

2:43

But hang on a sec. If I'm streaming a whole desktop through a browser tab,

2:48

I'm thinking about lag. You know, is it going to feel sluggish compared to my local

2:52

machine?

2:52

Yeah. Especially with graphics or video?

2:54

That's a fair question. And with older tech, maybe.

2:57

But Chasm uses their own open source tech called ChasmVNC. It's not your grandpa's

3:01

VNC.

3:02

Okay. So what's different about it?

3:03

It's specifically built for this job, streaming securely and efficiently to a web

3:07

browser.

3:07

It uses modern web protocols to send just the visual output, the pixels, to your

3:12

browser tab.

3:13

The result is remarkably smooth, low latency, and feels surprisingly close to

3:18

native,

3:19

even for demanding apps.

3:20

Got it. So the tech is there to make the experience good.

3:24

And it's not just a small experiment, is it?

3:26

The source mentioned over 100 million polls on Docker Hub. That sounds like a lot.

3:32

It is. That kind of number shows serious adoption.

3:35

It means hundreds of organizations, big ones, trust this approach. It's not just

3:39

theory.

3:39

It's verified enterprise-grade technology. It proves the container model works

3:44

reliably at scale.

3:45

Which you'd need if you're spinning up and carrying down potentially thousands of

3:48

these

3:48

sessions constantly.

3:49

Absolutely. That reliability and scale are crucial for making this whole

3:53

disposable model work seamlessly.

3:55

Okay. So speed, efficiency, scalability. Check. Now, let's talk security.

4:00

This seems to be where things get really interesting.

4:02

The core idea mentioned is browser isolation.

4:05

How does that fit into this zero trust idea we hear so much about?

4:09

Right. Zero trust basically means don't trust anything by default.

4:13

Verify everything. Browser isolation is a perfect example of that in action.

4:18

Let's say your computer is your house, right?

4:20

Okay, yeah.

4:21

Normally when you browse the web, especially clicking unknown links or

4:24

downloading files, you're potentially inviting threats into your house.

4:28

Malware, ransomware.

4:30

You're letting them through the front door.

4:32

Exactly. Browser isolation puts a stop to that.

4:35

The actual browsing, all the risky stuff, rendering webpages, running scripts,

4:39

handling potentially malicious content happens outside your house.

4:43

It happens remotely inside one of the secure disposable containers.

4:47

So the container is like a detached secure shed where the risky stuff happens.

4:52

That's a great way to put it.

4:53

The container acts as that zero trust secure web intermediary.

4:56

All that comes back to your actual computer, your house,

4:59

is a safe stream of pixels showing you what's happening in the shed.

5:03

The threat never gets near your local machine.

5:05

So I click on ransomware, it executes in that container.

5:08

Which is running on a server somewhere else, completely isolated.

5:11

And then when you're done, the container is destroyed, taking the ransomware with

5:15

it.

5:15

Your laptop, your phone, your tablet,

5:17

they're completely removed from the attack surface for that web activity.

5:20

And the source mentioned this is coupled with controls for data loss prevention.

5:24

Yes, absolutely.

5:25

It's not just about stopping threats coming in.

5:27

It's also about controlling data going out.

5:29

You can set very specific rules about what users can copy, paste, download, or

5:34

upload

5:35

between the remote session and their local device.

5:38

That leads us to the Chasm Cloud Browser.

5:40

This sounds like browser isolation offered as a service you can just sign up for.

5:45

The idea of a truly disposable browser is fascinating.

5:48

What does that really mean for a user day to day?

5:51

It's like having a magic reset button for your online identity and security

5:55

for every single session.

5:56

Every time you close that browser tab,

5:58

the entire container environment it was running in is completely wiped.

6:01

Poof. Gone.

6:02

So no leftover malware?

6:04

None. No tracking cookies, no browser history lingering, no cached files,

6:10

no session fingerprints that websites use to track you across visits.

6:15

Every single time you start a new session,

6:17

it's like using a brand new, perfectly clean, fully patched browser

6:22

that has never touched the internet before.

6:24

You don't have to worry about clearing your cache or history

6:27

because it's automatically obliterated.

6:28

Exactly. Ultimate digital hygiene, automatically enforced.

6:32

Okay. The source material brought up a really specific use case.

6:35

OSINT Open Source Intelligence and something called Managed Attribution.

6:40

That sounds pretty advanced. Why would researchers need that capability?

6:45

Well, think about it.

6:45

If you're an investigator, maybe a journalist or intelligence analyst

6:48

looking into sensitive topics or say tracking threat actors online,

6:53

you absolutely cannot have your research activities traced back to you or your

6:58

organization.

6:58

Because that could tick them off or reveal who's investigating them.

7:01

Precisely. It could compromise the entire investigation or even put people at risk.

7:05

Managed Attribution is designed to prevent that.

7:07

How does it work then? How does it hide the origin?

7:10

It ensures that all the technical details of your browsing session,

7:14

the IP address your traffic seems to come from, the unique fingerprint of your

7:18

browser,

7:19

even the timing signals, all appear to originate from a generic anonymous location

7:23

in the public

7:24

cloud, often somewhere geographically distant. So it looks like the search is

7:28

coming from

7:28

some random cloud server, not my office. Correct. And because that container

7:33

running

7:33

the browser is instantly destroyed after the session, there's no persistent link,

7:38

no trail connecting that specific activity back to the actual user or their

7:42

organization.

7:43

It provides anonymity and security through that instant digital amnesia.

7:47

Okay, that makes sense for high security stuff. Let's pivot now to maybe more

7:52

everyday business

7:53

use and compliance. How does this container streaming translate into practical

7:58

tools for

7:58

remote work? This is where we get into desktop as a service, or DES. Instead of

8:02

managing physical

8:03

laptops for everyone, organizations can provide cloud desktops on demand. Users get

8:08

access to a

8:08

full desktop environment, Windows, Linux, maybe even Mac OS within seconds, just by

8:13

opening the

8:14

browser. And it's scalable. Easy to add or remove users. Infinitely scalable,

8:18

essentially. And

8:19

because it's streamed, the user experience is consistent whether they're using a

8:23

low-powered

8:24

Chromebook or a high-end workstation. Their secure work environment lives in the

8:28

cloud,

8:29

accessible from anywhere. That flexibility sounds great. But what about a really

8:34

common

8:34

headache for IT legacy applications? Yeah. You know, that one critical piece of

8:38

software that

8:39

only runs on an old version of Java or maybe uses Adobe Flash. Oh yeah, the bane of

8:44

many IT

8:45

departments. They can't update the operating system because it breaks the app, but

8:49

running the old

8:50

stuff is a massive security risk. Right. So how does this help? This is where app

8:54

streaming becomes

8:55

a lifesaver. Chasm allows organizations to host those legacy applications, Flash,

9:00

old Java,

9:01

whatever it is, inside one of these secure, isolated containers. So the risky old

9:06

app runs

9:06

remotely in its own little sandbox. Exactly. The user accesses it through their

9:10

browser, just like

9:11

any other web app. It works, they can do their job, but the application itself,

9:16

with all its potential

9:17

vulnerabilities, never gets installed on their local machine. It stays contained.

9:21

The risk is

9:21

quarantined, basically, and when they close the tab, the container and the risk

9:26

disappears.

9:27

No installation, no local maintenance burden, and the security hole is plugged. It's

9:33

a fantastic way

9:34

to handle technical debt and keep essential but outdated systems running safely.

9:38

Let's bring in

9:39

those examples from the source material to make it real. There was a realtor

9:42

mentioned. Why would

9:44

a realtor need this? Seems like an everyday job. Well, think about Diane, the realtor.

9:49

Her job

9:50

involves constantly visiting unfamiliar websites from clients, opening documents

9:54

attached to emails

9:55

from unknown senders, checking various webmail accounts. Okay, yeah, lots of

9:59

potential phishing

10:00

links and dodgy attachments there. Right. So she used a Chasm cloud desktop. All

10:05

that potentially

10:06

risky activity happened in the disposable cloud environment. If she clicked a bad

10:10

link or opened

10:11

a malicious PDF, it hit the container, not her personal computer where she keeps

10:15

client info and

10:15

financials. Peace of mind. Makes sense. And then there was the cybersecurity

10:19

principle using it

10:20

for threat intelligence. That ties back to the OSINT and managed attribution we

10:24

discussed.

10:25

Exactly. It perfectly illustrates that high-end security use case hunting for

10:30

threats online,

10:30

anonymously and safely, knowing that the malware they might encounter is completely

10:35

isolated and

10:36

disposable. It really shows the range, doesn't it? From protecting a realtor,

10:40

opening emails,

10:41

to securing an advanced threat hunter. It does. The core principle of secure,

10:44

disposable, streamed environments applies across the board. Okay. One more critical

10:49

area for

10:49

businesses. Compliance. Dealing with regulations like SOC 2, NIST, HIPAA, ISO. It's

10:56

complex. Yeah.

10:58

How does a platform like this help? It helps significantly. A major part of

11:01

compliance is

11:02

controlling where sensitive data lives and who can access it and how. Because Chasm

11:06

keeps the

11:07

applications and data within the organization's controlled infrastructure, it never

11:11

actually

11:11

resides on the user's potentially insecure personal device. It simplifies things

11:15

dramatically.

11:16

So the data doesn't leak out onto unmanaged laptops? Correct. It acts as a secure

11:21

gateway

11:22

to corporate resources. You access what you need through the secure stream, but the

11:26

data itself

11:27

stays put. This reduces the need for traditional VPNs, which can have their own

11:31

vulnerabilities,

11:33

and it makes demonstrating control for audits much easier. You're minimizing the

11:37

data leakage

11:37

risk right at the point of access. We've covered a lot of ground. The tech, the

11:42

security, the

11:42

applications. Something else that stood out for the material was the platform's

11:46

flexibility and

11:47

openness. They offer a community edition. They do. Yes. It's free for individuals,

11:53

home lab users,

11:54

nonprofits, testing. It shows a commitment to not just being a closed off

11:59

enterprise product. They

12:00

want people tinkering and building. And for developers who want to build on it.

12:03

There's a

12:04

developer API. If you want to integrate this streaming capability into your own

12:08

custom

12:08

applications, the tools are there. The source also mentioned specific tools for

12:13

deployment,

12:13

Ansible, and Terraform. Now, why should someone who isn't an IT pro care about

12:19

those names? Well,

12:20

those names signal that this platform is built for the real world of modern IT. Ansible

12:26

and Terraform

12:27

are the standard ways large organizations automate deploying and managing software,

12:32

whether it's on their own servers or in the cloud. So it means Chasm can be rolled

12:36

out quickly,

12:37

reliably, automatically, at scale. Exactly. It's about infrastructure as code.

12:42

Repeatable,

12:44

consistent deployments, fewer errors, faster scaling. It shows it's designed to

12:49

integrate

12:50

smoothly into existing enterprise workflows, whether on-premise or multi-cloud. And

12:55

they

12:55

provide ready-made workspace images too, right? Like pre-built browsers and desktops.

12:59

Yes,

13:00

a whole library of them, plus extensive documentation. The goal seems to be making

13:04

it accessible, whether you're just starting and need a secure browser quickly, or

13:07

you're

13:08

a large enterprise planning a complex deployment. That modularity and flexibility

13:12

seems key to

13:13

serving such different needs. Definitely. It has to be adaptable. Okay, so let's

13:17

try and pull

13:17

this all together. We've gone on quite a journey from just thinking about software

13:21

on our own

13:22

computers. What's the big picture here? At the end of the day, the real power of

13:26

something like

13:26

Chasm Workspaces is its ability to securely isolate and stream whatever digital

13:31

tool you need,

13:32

a browser, a specific app, even a full desktop, by making that environment

13:37

containerized,

13:38

disposable, and delivered through a zero trust stream. It makes your actual

13:42

physical device,

13:43

your laptop or phone, almost irrelevant from a security standpoint for that task.

13:47

Exactly.

13:48

The risk stays contained in the cloud in that ephemeral session, and then it just

13:53

evaporates.

13:53

It fundamentally shifts to where the security boundary lies. So here's a thought to

13:57

leave you

13:58

with. If your browser effectively becomes the universal application, and every

14:02

session you run

14:03

inside it can be completely disposable, secure, maybe even untraceable, what's the

14:07

most valuable

14:08

piece of tech you actually own? Is it the physical device in your hands, or is it

14:12

just the key,

14:12

the access method, that lets you into these secure cloud environments? Something to

14:16

think about for

14:17

sure. The value shifts from the endpoint to the secure access. Indeed. And once

14:23

again, a big thank

14:24

you to our supporters, Save Server, for helping us bring you this deep dive.

14:26

Remember, they handle

14:27

hosting for software like this and support digital transformation. Check them out

14:31

Join us next time as we explore another piece of technology shaping our future.

14:31

Join us next time as we explore another piece of technology shaping our future.