Remote browser isolation (RBI), also known as web isolation or browser isolation, is a web security solution designed to protect users from Internet-borne threats. By rendering Internet content in a sandboxed environment and delivering only the final rendered page to the browser, it protects against some malware embedded in web pages.
Infected or malicious websites are a common way for cybercriminals to deliver malware to users. Phishing emails are a primary delivery vector for malware, and these emails commonly contain a link directing the recipient to a malicious web page.
When a user browses to a malicious page, code embedded in the page is run within the user’s browser. While most website code is legitimate, websites can also contain malicious code designed to steal user credentials or deliver malware to the user’s computer. Browser isolation can protect Internet users’ computers from being infected by malware delivered via the Internet.
Delivery of malware via infected or malicious websites works because the user’s browser accepts and runs code from the site that the user is visiting. Remote Browser Isolation eliminates this in-browser code execution, protecting the user from malicious downloads.
Instead, the web page is processed within a browser hosted in the cloud. This browser is running in a sandboxed environment and can be disposed of when the user’s browsing session is complete, eliminating the risks associated with any malware downloaded to it during the user’s browsing session.
After this cloud-based browser has rendered or scanned a webpage, they deliver it to the user in some way, enabling the user’s browser to interact with it like they would a locally hosted webpage. This provides the ability to browse even potentially malware-laden sites on the Internet with much less risk.
RBI systems are designed to scrub a webpage of malicious content before delivering it to the user. A couple of ways in which this is accomplished include:
RBI has the potential to protect an organization and its users against some of the most common and dangerous vectors for cyberattacks. However, these solutions have their limitations, including:
Polar Zone, which is based on the segregation of users’ applications and browsers, isolates the organizations internal network from the Internet, and provides users with access to the Internet and the organization’s internal network while maintaining security.