The Web is Where Business Happens. Ericom Shield Makes it Safe.

Protect endpoints without hampering productivity and frustrating your users. No more overblocking access to websites they need!

With no agents to install or exceptions to manage, Ericom Shield saves time, resources and hassle for IT staff.

User Access to Websites They Need, Without Risk of Cyberattack

Ericom Shield renders website content in virtual browsers that are isolated in the cloud. Safe rendering info, seamlessly streamed to users’ regular browsers, provides a natural, fully interactive user experience, while safeguarding networks from malware on sites.

Integrated Content Disarm and Reconstruction (CDR) technology sanitizes web downloads and email attachments of embedded malware, while leaving desired native functionality intact.

Stops Even
Undetectable Malware

Malware, ransomware, and zero-day threats emerge too rapidly for traditional signature-based security solutions to keep pace. But since Ericom Shield prevents all  malware from reaching endpoints and networks, users get a great web browsing experience, risk free.
Next-Gen Protection from Phishing and Credential Theft

Hackers depend on email as the cyber threat delivery vector most likely to succeed. Ericom Shield isolates malicious websites accessed from email links and renders them harmless. Unrecognized websites can be opened as "read-only", so users can’t enter credentials in even brilliantly spoofed sites.

Stop Exfiltration of Sensitive Data

Websites and cloud apps, along with the browsers used to access them, are prime channels for data escape. Browser caches (especially in unmanaged devices), social media and cloud storage apps, and even print-from-browser functions represent data security risks.

To prevent data loss, Ericom Shield offers policy-based control of browser functionality and actions permitted on restricted websites and apps, for individuals or groups.


Protect Web and Cloud Applications From Attacks

When cybercriminals target corporate web and cloud apps, they often start by probing for app vulnerabilities to exploit. Web Application Isolation completely cloaks web-exposed application attack surfaces, so attackers can’t exploit entry points like web page code and exposed APIs – and can’t penetrate applications to steal data, disrupt operations, and more.


Please make sure that the email address you have entered is one you’ve used on our site in the past and try again. If this issue persists, please register as a new user.