Browser Isolation for Film and TV Industry MPA TPN Compliance

Organizations that create or distribute film and TV content, such as production and post-production studios and visual effects companies, can use Ericom Web Isolation, Ericom’s remote browser isolation (RBI) solution, to connect production devices to internet tools like email and web browsing, while fully protecting valuable intellectual property (IP) and pre-release content.

The RBI and MPA Guidelines document highlights how Ericom Web Isolation aligns with MPA best practice recommendations.

RBI and MPA Guidelines


Click image to enlarge

Ericom Web Isolation

Ericom Zero Trust Web Isolation uses RBI to render website content in virtual browsers located in cloud-based containers.

Only safe rendering information is sent to users’ regular web browsers, provides a natural, fully interactive user experience, while safeguarding devices and networks from malware hidden on websites – even advanced zero-day ransomware.

  • Block weaponized downloads/attachments with Content Disarm and Reconstruction (CDR) capabilities that remove malware from web downloads and email attachments
  • Prevent malware, ransomware, and zero-day web threats from infecting user devices and networks
  • Isolate suspected phishing sites and render them as read-only to prevent credential theft with next-gen email security
  • Stop sensitive data from being stored in browser caches and limit data sharing on websites and cloud apps


Jellyfish Pictures Leverages Remote Browser Isolation
for MPA TPN Compliance

Read the Case Study

“We have seen a number of studios using the Ericom RBI solution, including Jellyfish Pictures, and are pleased with the role the technology plays in satisfying key parts of their TPN security compliance requirements.”

– Mathew Gilliat‑Smith, EVP

Read More

Entertainment and VFX Partners

Resources View All

Ericom Web Isolation For TPN Programs

Download PDF

Ericom RBI Alignment with MPA-TPN Content Security Program

Download PDF

Ericom Security Solution Summary Solution Sheet

Download PDF

Moving to a Zero Trust
isolation-based security
approach is faster and easier
than you think.

Get a 1:1 Demo