RBI and the Importance of Integrated Threat Protection

Source
Advertisement


It sounds like a nearly perfect cybersecurity solution: Intercept incoming data before it reaches the user’s web browser; isolate it in a secure sandbox; and send only the screen images—or pixels—to the browser. The ephemeral server is fully isolated from the organization’s IT assets and data, and its browser sessions are destroyed when the user closes a tab.

This technique is called remote browser isolation (RBI) and prevents malicious code or software from infiltrating end-user devices, making it theoretically impossible for bad actors to be successful with a web-born attack. Given that the browser is central to most of what people do on their PCs these days, it would seem to be the right solution at the right time.

Advertisement