Download PDF version Contact company

Forcepoint is excited to bring the industry’s first smart RBI to Forcepoint customers. Remote Browser Isolation (RBI) enforces Zero Trust security for web browsing.

Other web security technologies rely on first being able to detect malware, and then respond by blocking malicious content. In contrast, RBI applies a Zero Trust approach by treating all web pages as compromised from the outset.

Remote browsing

If users have to rely on perfect foreknowledge of every form that malware could take users are starting in an impossible position that makes policy creation an ulcer-inducing task.

RBI offers an easier way by remotely rendering content in an isolated browser just like a normal browsing session

However, RBI offers an easier way by remotely rendering content in an isolated browser and streaming the session back to the user fully sanitised, and in a way that looks just like a normal browsing session. The one potential drawback is that this ultimate assurance mode of rendering web pages can eat up bandwidth for activities like scrolling through text-heavy pages or viewing video content.

Fast user experience

There is another mode of RBI that remotely strips out active content and sends the necessary HTML code to be rendered locally, which enables a fast user experience that is indistinguishable from normal, native web browsing. 

It’s like wearing the appropriate gear for a contact sport, users need enough to mitigate the risks, but also balanced with performance; they wouldn’t wear football pads to play basketball for example.

Smart Isolation

The hard part about web security is knowing which types of pages are more like a high contact sport and which are less risky, after all, that is what the hackers are doing every day; working to make dangerous sites look just like normal, safe ones.

Forcepoint created Smart Isolation, to automatically adjust between the two rendering modes based on potential risk

RBI gives us two modes necessary to deal with all the ultra-risky sites as well as the unknown or potentially risky ones but choosing when to use which mode for each combination of web category and user group can cause anxiety in its own right. This is why Forcepoint created Smart Isolation, to automatically adjust between the two rendering modes based on potential risk or verified trust of the page and associated content.

Forcepoint is an expert in threat intelligence, so let us do the hard work of determining how to blend high assurance security and fast performance so users can focus on more strategic efforts.

Zero Trust CDR technology

The balance between high assurance security and performance does not stop with Smart Isolation though. Forcepoint RBI also introduces the industry’s first integration of RBI with Zero Trust Content Disarm and Reconstruction (CDR) technology to apply a Zero Trust approach for downloading files in an RBI session.

With these Forcepoint innovations, organisations can have confidence that their users will always have the perfect balance of performance and high assurance security as they browse the web and download files.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?