What is Browser Isolation?

What is browser isolation? Learn about browser isolation and its role in protecting against web-borne threats.


What is Browser Isolation?

Browser isolation is an approach to cybersecurity that separates a user’s web browsing activity from the local network and its infrastructure.

When a browser isolation solution is in place, any active code or scripts originating from the web browser are run in an isolated, disposable container. Browser isolation is also sometimes referred to as “web isolation”, or when it is not running on the user device, “remote browser isolation” (RBI). This means that web-based malware never reaches the endpoint or organizational network at all.


The benefits of browser isolation

Browser isolation is an effective solution against many types of web-borne threats, such as ransomware and malvertising.


The benefits of using a good browser isolation solution include:

Protection from known and unknown threats
Browser isolation is a prevention-based approach. It doesn’t rely on detecting known threats using signatures. Instead, it runs all active code outside of the network, suspicious or otherwise, so that no threat makes it to the network or endpoint - even the latest, unknown threats.
Retained productivity
A good browser isolation solution will provide a seamless browsing experience, using a safe, interactive content stream, so that users can continue to browse the web as normal, without the risk of falling prey to web-borne threats.
Central management
Browser isolation solutions may provide a central dashboard for managing web security at the network level
Reduced need for endpoint protection solutions
Remote browser isolation solutions reduce the complexity and costs associated with protecting individual endpoint devices from web-based threats, as there is no need for endpoint software installation.
Safe file downloads
Some browser isolation solutions, such as Ericom Shield, include factory-integrated file sanitization using CDR technology. This ensures that any files downloaded from the web are clean and safe to use.

Contact us if you have any questions.


People who read this article also read:

Virtual Browsers vs Remote Browser Isolation: Which Secure Browsing Solution is Right for Your Organization Extending the Zero Trust Model to the Public Web With Browser Isolation