Remote Browser for Zero Trust Approach

Share post

Most attacks on businesses come through email or through browser content and downloads. Ericom Remote Browser Isolation (RBI) funnels websites through a cloud instance, removing unnecessary code and making browsing safer. Downloads are also checked or isolated in the cloud before delivery.

The browser is the world's most used application. Active content ensures a high level of convenience and supports users in automatically triggering a wide variety of processes. However, the shift to the browser brings with it new security risks: Verizon states in the Data Breach Investigations Report that the number of cyber attacks increased by 2021 percent in 13. Google notes up to 30.000 new websites with malicious code every day.

Remote browser isolation

If you look at the page source code of a typical portal, it quickly adds up to several thousand lines of code. This offers a sufficiently large potential to camouflage cyber attacks, since a neutral evaluation of the code is hardly possible in practice. Using Ericom Remote Browser Isolation (RBI) offloads website code execution away from the endpoint. Malware can then no longer unleash attack potential. Ransomware and phishing attacks are blocked just as effectively as zero-day malware.

When calling up a website via Ericom RBI, all text, video and audio data is rendered in an anonymous, session-related container in the cloud. Only the cleaned end result is sent back to the browser used. The source code is reduced to a few lines, all of which refer to the cloud container that buffers the active session. When the session ends, the container is automatically destroyed without leaving any traces.

Secure transport through cloud containers

In order to prevent user input (such as passwords or credit card data) from being tapped, RBI can also restrict access to individual or specific Internet pages to a “read-only mode”. The user is completely anonymous to the original website called up, since only the public IP address of the cloud container is known. An identification of companies or users for browser-based attacks is not given.

Automatic cleanup of downloads

🔎 This is how Ericom Remote Browser Isolation (RBI) works – the code is cleaned in the cloud (Image: Ericom). 

With "Content Disarm & Reconstruct" (CDR), browser protection is also extended to downloads: Before being saved on the local end device, each file goes through a multi-stage cleaning process in which the content is analyzed and only useful content is adopted and harmful parts are removed. A classic example is application letters in Word or PDF format that appear inconspicuous and may contain malicious code.

Access Restrictions

Ericom RBI has strong protection mechanisms that regulate access to websites and, if necessary, apply restrictions to it. For example, calling up websites in certain categories can be generally prohibited – or is only possible with restrictions. Despite the rendered webpage appearance, there are practically no limitations in the user experience. As part of the ZTEdge product family, Ericom Remote Browser Isolation is optimized for high loads and maximum performance. Webcasts, videos and audio data can also be used without any problems - the cloud scales automatically and provides the necessary bandwidth at all times.

Cyber ​​Defense InfoSec Awards

Ericom Remote Browser Isolation (RBI) won Most Comprehensive Ransomless Ransomware Protection, Next Gen Browser Isolation, and Most Innovative Deep Sea Phishing awards at the 2022 RSA Conference.

More at Giritech.de

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more