x

The Web is Where Business Happens. Ericom Shield Makes it Safe.


Protect endpoints without hampering productivity and frustrating your users. No more overblocking access to websites they need!

With no agents to install or exceptions to manage, Ericom Shield saves time, resources and hassle for IT staff.



User Access to Websites They Need, Without Risk of Cyberattack

Ericom Shield renders website content in virtual browsers that are isolated in the cloud. Safe rendering info, seamlessly streamed to users’ regular browsers, provides a natural, fully interactive user experience, while safeguarding networks from malware on sites.

Integrated Content Disarm and Reconstruction (CDR) technology sanitizes web downloads and email attachments of embedded malware, while leaving desired native functionality intact.


GET DATASHEET
SEE HOW IT WORKS
Stops Even
Undetectable Malware



Malware, ransomware, and zero-day threats emerge too rapidly for traditional signature-based security solutions to keep pace. But since Ericom Shield prevents all  malware from reaching endpoints and networks, users get a great web browsing experience, risk free.
GET FREE WHITEPAPER
Next-Gen Protection from Phishing and Credential Theft



Hackers depend on email as the cyber threat delivery vector most likely to succeed. Ericom Shield isolates malicious websites accessed from email links and renders them harmless. Unrecognized websites can be opened as "read-only", so users can’t enter credentials in even brilliantly spoofed sites.
GET FREE WHITEPAPER



Stop Exfiltration of Sensitive Data



Websites and cloud apps, along with the browsers used to access them, are prime channels for data escape. Browser caches (especially in unmanaged devices), social media and cloud storage apps, and even print-from-browser functions represent data security risks.

To prevent data loss, Ericom Shield offers policy-based control of browser functionality and actions permitted on restricted websites and apps, for individuals or groups.


LEARN MORE

Protect Web and Cloud Applications From Attacks


When cybercriminals target corporate web and cloud apps, they often start by probing for app vulnerabilities to exploit. Web Application Isolation completely cloaks web-exposed application attack surfaces, so attackers can’t exploit entry points like web page code and exposed APIs – and can’t penetrate applications to steal data, disrupt operations, and more.


WATCH VIDEO



Please make sure that the email address you have entered is one you’ve used on our site in the past and try again. If this issue persists, please register as a new user.