Not All RBI Solutions
Are Created Equal

Ask Remote Browser Isolation (RBI) vendors some key questions to make sure you position your web security program for success.

Comparing Remote Browser Isolation Solutions

Demand for Remote Browser Isolation (RBI) is surging as organizations adopt the technology to bolster their web and email security defenses in the face of escalating ransomware and zero-day threats.

As they investigate the benefits of RBI technology, organizations quickly discover that there are significant differences in the current solutions in the market. To help our customers and those teams who are evaluating RBI solutions best determine which one fits their needs, we highlight the Top 4 questions to help you more effectively investigate RBI offerings. Contact us to learn more.

Question: Is the browsing experience standard?

Ask “Does this RBI offering function as a native browser? And would my users know that they are using an RBI system?”

The web browser has become a key productivity application for most employees, so IT teams are careful about making significant changes to their users’ web browsing experience.

A good RBI product should be “invisible” to users and shouldn’t impact their access to and use of the web. Less useful RBI offerings use a “browser within a browser” approach which introduces a notably different experience for users and requires new web browser apps to be used to enforce isolation policies.

Question: How is performance impacted?

Anything that slows down web performance, even in the name of security, is a problem.

Some RBI vendors have invested heavily in their technologies and infrastructure, offering multiple “rendering modes” and highly available global cloud infrastructures to keep isolated web traffic moving quickly. Other less-effective solutions offer only 1st-generation slow “pixel-pushing” technology and limited on-premises and cloud deployment options.

Question: Are inboxes protected?

The inbox is the primary entry point for ransomware, so RBI’s ability to improve email security is critical to minimizing the risk that email and phishing present.

Secure RBI solutions should be able to render suspicious websites in an isolated “read-only mode.” This way when a user clicks an email or phishing link, isolation blocks all malware, and the site is displayed in read-only mode to prevent users from entering IDs and passwords. Ask “how does the RBI solution defend my inbox?”

Question: Are virtual meetings secured?

Virtual meeting solutions like Zoom have become a standard part of the workday for most business professionals around the globe.

Some innovative RBI solutions allow virtual meeting resources like cameras, microphones, and screen-sharing to be used within an isolated environment that keeps users safe from hackers. You should ask “does this RBI solution enable virtual meetings to operate seamlessly and securely, without additional application installations?”

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo