Ask Remote Browser Isolation (RBI) vendors some key questions to make sure you position your web security program for success.
Demand for Remote Browser Isolation (RBI) is surging as organizations adopt the technology to bolster their web and email security defenses in the face of escalating ransomware and zero-day threats. This recent blog from Zero Trust thought leader Dr. Chase Cunningham covers the benefits that organizations realize when they adopt RBI as a key control within their Zero Trust security strategies.
Organizations investigating the benefits of RBI technology quickly discover that there are significant differences in the current solutions in the market. To help our customers and those teams who are evaluating RBI solutions best determine which one fits their needs, we’ve created a sample RFI document that can be used to help more effectively investigate RBI offerings.
While there are nearly 20 questions in the sample RFI document, four are so important to a successful RBI program that they are highlighted below.
Ask “Does this RBI offering function as a native browser? And would my users know that they are using an RBI system?”
The web browser has become a key productivity application for most employees, so IT teams are careful about making significant changes to their users’ web browsing experience.
A good RBI product should be “invisible” to users and shouldn’t impact their access to and use of the web. Less useful RBI offerings use a “browser within a browser” approach which introduces a notably different experience for users and requires new web browser apps to be used to enforce isolation policies.
Anything that slows down web performance, even in the name of security, is a problem.
Some RBI vendors have invested heavily in their technologies and infrastructure, offering multiple “rendering modes” and highly available global cloud infrastructures to keep isolated web traffic moving quickly. Other less-effective solutions offer only 1st-generation slow “pixel-pushing” technology and limited on-premises and cloud deployment options.
The inbox is the primary entry point for ransomware, so RBI’s ability to improve email security is critical to minimizing the risk that email and phishing present.
Secure RBI solutions should be able to render suspicious websites in an isolated “read-only mode.” This way when a user clicks an email or phishing link, isolation blocks all malware, and the site is displayed in read-only mode to prevent users from entering IDs and passwords. Ask “how does the RBI solution defend my inbox?”
Virtual meeting solutions like Zoom have become a standard part of the workday for most business professionals around the globe.
Some innovative RBI solutions allow virtual meeting resources like cameras, microphones, and screen-sharing to be used within an isolated environment that keeps users safe from hackers. You should ask “does this RBI solution enable virtual meetings to operate seamlessly and securely, without additional application installations?”
Get the facts that you need to choose the right RBI selection for your organization!