The world is not black and white, but web security tools often reduce situations to a simple binary response—sites are either safe or dangerous. If there might be threats present then access to a site is denied.
But sometimes users might have a legitimate reason to access a site even if it might be malicious (i.e. investigating insurance claims, researching a business for loan approval, or accessing a potentially risky partner site). In cases like these, the business needs a safe way to use such sites. That’s why many organizations are going beyond traditional “block” or “allow” security, using new technology such as Remote Browser Isolation (RBI) to give people the best of both worlds—usability with security.
That’s where Remote Browser Isolation (RBI) comes in. RBI enables organizations to take a Zero Trust approach to web access. With RBI, web traffic is automatically redirected through an isolated browser in a secure container. There, potentially risky web content can be rendered, with the results sent to the user as a safe stream of pixels, providing a familiar, native browser experience. If there is any malware on the site, this process strips it from what is passed to the user, allowing them a safe browsing experience even on a malicious site. This is the best kind of protection: the security tool itself is almost invisible to the user but delivers the highest possible security efficacy.
More Forcepoint RBI integrations and features coming soon
Since we acquired Cyberinc in May, Forcepoint recently added new RBI technology for Forcepoint Web Security in August of this year bringing secure pixel steaming capabilities. We will be adding more new capabilities soon, including a new approach to providing a natural user experience that will be unique in the industry.
Furthermore, we’ll be integrating innovative content disarm and reconstruction technology from our recent acquisition of Deep Secure to provide a Zero Trust method for file transfer during an RBI session. This will enable downloaded files to be taken apart and rebuilt in the same format with only the safe parts—eliminating the uncertainty that comes with detection-based solutions.
We see security differently from other vendors: it’s not enough to just enable people to get to information, they have to be able to use it without putting the organization at risk. To make this possible, we are bringing together the most comprehensive set of capabilities to protect all that users do online, in a way that gives users the best possible experience so that they are safe and productive.