Most attacks on businesses come through email or through browser content and downloads. Ericom Remote Browser Isolation (RBI) funnels websites through a cloud instance, removing unnecessary code and making browsing safer. Downloads are also checked or isolated in the cloud before delivery.
The browser is the world's most used application. Active content ensures a high level of convenience and supports users in automatically triggering a wide variety of processes. However, the shift to the browser brings with it new security risks: Verizon states in the Data Breach Investigations Report that the number of cyber attacks increased by 2021 percent in 13. Google notes up to 30.000 new websites with malicious code every day.
Remote browser isolation
If you look at the page source code of a typical portal, it quickly adds up to several thousand lines of code. This offers a sufficiently large potential to camouflage cyber attacks, since a neutral evaluation of the code is hardly possible in practice. Using Ericom Remote Browser Isolation (RBI) offloads website code execution away from the endpoint. Malware can then no longer unleash attack potential. Ransomware and phishing attacks are blocked just as effectively as zero-day malware.
When calling up a website via Ericom RBI, all text, video and audio data is rendered in an anonymous, session-related container in the cloud. Only the cleaned end result is sent back to the browser used. The source code is reduced to a few lines, all of which refer to the cloud container that buffers the active session. When the session ends, the container is automatically destroyed without leaving any traces.
Secure transport through cloud containers
In order to prevent user input (such as passwords or credit card data) from being tapped, RBI can also restrict access to individual or specific Internet pages to a “read-only mode”. The user is completely anonymous to the original website called up, since only the public IP address of the cloud container is known. An identification of companies or users for browser-based attacks is not given.
Automatic cleanup of downloads
With "Content Disarm & Reconstruct" (CDR), browser protection is also extended to downloads: Before being saved on the local end device, each file goes through a multi-stage cleaning process in which the content is analyzed and only useful content is adopted and harmful parts are removed. A classic example is application letters in Word or PDF format that appear inconspicuous and may contain malicious code.
Access Restrictions
Ericom RBI has strong protection mechanisms that regulate access to websites and, if necessary, apply restrictions to it. For example, calling up websites in certain categories can be generally prohibited – or is only possible with restrictions. Despite the rendered webpage appearance, there are practically no limitations in the user experience. As part of the ZTEdge product family, Ericom Remote Browser Isolation is optimized for high loads and maximum performance. Webcasts, videos and audio data can also be used without any problems - the cloud scales automatically and provides the necessary bandwidth at all times.
Cyber Defense InfoSec Awards
Ericom Remote Browser Isolation (RBI) won Most Comprehensive Ransomless Ransomware Protection, Next Gen Browser Isolation, and Most Innovative Deep Sea Phishing awards at the 2022 RSA Conference.
More at Giritech.de