Stop cyber attacks with remote browser isolation

Stop cyber attacks with remote browser isolation

Share post

Safe surfing using the zero trust approach for websites, email links and downloads. Ericom Shield blocks cyber attacks via the web browser, protects users from phishing attacks, malware, ransomware and other threats from remote use. Shield allows completely transparent internet usage.

Most companies and institutions use different solutions to prevent employees from visiting problematic websites. The only problem is that between 10.000 and 30.000 new websites containing malicious code are identified every day. A single wrong click is enough to put the entire organization in danger: computers encrypted by malware, ransom demands, the loss of customer data and more can result. The conventional approach relies on antivirus software and firewalls to detect and block threats.

What is Remote Browser Isolation?

Remote Browser Isolation (RBI) is based on the basic concept of virtual browsers, but goes one step further. In contrast to RDS / VDI scenarios, all browsing activities are carried out in a remote location isolated from the local network. The remote, virtual browser runs within a dedicated Linux container, with each browser tab being assigned its own container. As soon as the user starts his first session by clicking on a link or entering a URL, one of the containers within the pool is assigned to this session. The system translates all active web content into pure image and audio files, which are streamed in real time to the end device of the user in order to enable fully transparent and interactive surfing on the Internet.

Since no web code is executed on the user's device, both the network and all endpoints are protected from malware, cyberattacks and other threats that may lurk in the original code of the pages visited. If the user closes or hides a browser tab, the corresponding container is immediately discarded, along with any potential malware that might have infected the company.

Advantages of RBI

Ericom Shield Remote Browser Isolation with Zero Trust approach (Image: Giritech GmbH).

Compared to classic virtual browsers, Remote Browser Isolation scores with a better user experience, lower technical overhead and greater security.

Technical consideration

Many virtual browsers run on RDS / VDI platforms, which means that hardware requirements and server / client configuration are not exactly trivial and may require the purchase of Microsoft CALs (Client Access Licenses). A Linux-based RBI container architecture places much lower demands on the hardware, which leads to noticeable cost reductions in the long term and makes the solution more scalable.

User experience - speed

Starting a virtual browser takes time, if only because it takes time for the RDP session to be established. Containerized remote browsers, however, start immediately.

Business security

The isolated containers in the RBI solution provide a new, pristine environment for every tab and session, which is thrown away as soon as the tab or session is no longer in use. This prevents malware (e.g. XSS) from becoming lodged and spreading in the company.

More at Giritech.de

 


About Giritech

Giritech supports companies, educational organizations, healthcare facilities and public clients in the implementation of a consistent enterprise mobility and security strategy. As a long-standing distributor for manufacturers such as Soliton Systems, Ericom Software, WiseMo and Faronics Corp., Giritech has the necessary experience in on-site and remote implementation, provides pre- and after-sales support and supports users in choosing the right products for specific environments.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more