Posted on January 25, 2022
Earlier this month I blogged about the increase in market adoption of remote browser isolation (RBI) in 2021, driven primarily by organizations applying RBI to address web and email security within Secure Access Service Edge (SASE) and Zero Trust security frameworks. Analysis of Ericom engagements in 2021 revealed that Ericom RBI was used with a broad set of Secure Web Gateways (SWGs) and NGFWs, representing a who’s who of the largest security vendors in the world, including Cisco’s popular Umbrella cloud offering and Web Security Appliance (WSA) on-premises security gateway.
Adding RBI to Cisco Umbrella or Cisco Web Security Appliance provides organizations with a strong layered defense for web security. Let’s see how RBI interacts with a DNS or proxy-based security gateway, with Umbrella as our example. When Umbrella’s threat and risk data determines that web traffic is suspicious or risky, it forwards the traffic to Ericom’s RBI solution, ZTEdge Web Isolation. ZTEdge Web Isolation renders the website in a remote cloud container, so that phishing sites, ransomware, zero-day malware, and other advanced web threats never reach endpoints. Whether users browse to a malicious site directly or by clicking a URL embedded in a phishing email, they are completely safe since no web content is ever executed directly on their devices. Safe rendering data representing the website is sent to their device’s browser, providing a safe, fully interactive, seamless user experience. Attached files are sanitized before being transmitted to endpoints, ensuring that malware within downloads cannot compromise users’ devices.
Ericom’s RBI integration with Cisco Umbrella offers additional benefits by enabling data sharing controls for users who are interacting with the web and cloud applications. For example, policy-based controls may be applied to restrict web browser capabilities such as printing, downloading and copy/pasting content to or from websites. Sites that might be phishing sites, such as those that are newly created or linked to from emails, can be automatically opened in “read-only” mode to prevent users from entering data such as login credentials. RBI offers many additional protections — check out our white paper to learn more about the data security benefits of remote browser isolation.
When we speak with Cisco customers about their choice of Ericom’s RBI versus alternatives, conversations quickly turn to Ericom’s distinct advantages in end-user experience, performance, ability to accurately render websites and web/cloud applications, as well as the Ericom team’s support as they evaluated our solution. If your organization is considering adding RBI, “Key Questions to Ask RBI Solutions Providers” provides excellent guidance regarding the most important capabilities to consider when evaluating solutions.
Ericom’s Group CTO Mendy Newman has helped a number of organizations deploy Ericom RBI with their Cisco security gateways. He recently recorded a short video that covers the integration process and demonstrates the end user experience of the combined solution. Of course, nothing takes the place of a live demonstration, where we can drill down into your specific use cases and questions. I urge you to contact us to arrange a 30-minute meeting to learn how RBI can be used to address your organization’s specific needs.
“Operation Duck Hunt” Shuts Down QakBot Botnet
The FBI-led takedown of Qakbot was an operation that involved seven countries. Malware was removed from 700,000 computers. But don’t think all that makes you safe.
How GenAI is Supercharging Zero-Day Cyberattacks
Generative AI empowers its users to work fast, better and more efficiently. Alas, this includes cybercriminals, who are using malicious GenAI platforms to accelerate zero-day exploit creation.
Cybercriminals Disdain the Law, But Find Law Firms Attractive
Cybercriminals love the multiplier effect they get from attacking law firms: Hack in, and they get firm data PLUS juicy confidential client info.