You are on page 1of 9

Mohamed Ismail E

Do you know? What is


Cloud Browser
Isolation
Mohamed Ismail E

Cloud Browser Isolation (CBI) is a


security technology that separates
the web browsing process from
the local device and network by
running the web browser on a
remote server in the cloud. CBI is a
newer technology that builds on
the concept of Remote Browser
Isolation (RBI), but instead of
running the browser on a local
virtual machine, it runs the
browser on a remote cloud
infrastructure.
Mohamed Ismail E

CBI works by redirecting all web


browsing activity to a remote
cloud server, where the browser
runs in a virtual environment. All
web content is processed in the
cloud, and only the rendered
content is sent back to the end-
user's device. This ensures that any
malicious code or threats are
contained in the cloud
environment and cannot infect the
end-user's device.
Mohamed Ismail E

USE CASES

1.Secure web browsing: Cloud


browser isolation can be used to
securely access web-based
applications, including email,
collaboration tools, and other
cloud-based services. By isolating
the browsing session, any malware
or other threats encountered while
browsing the web are contained
within the cloud environment,
protecting the user's endpoint
device.
Mohamed Ismail E

2.Remote access: Cloud browser


isolation can be used to provide
remote access to web-based
applications and services for
employees, contractors, and other
third-party users. This allows users
to securely access corporate
resources from any location without
the need for a VPN or other remote
access technology.
Mohamed Ismail E

3.Secure web transactions: Cloud


browser isolation can be used to
secure online transactions, such as
online banking, e-commerce, and
other financial transactions. By
isolating the browsing session, any
sensitive data entered into the web
application, such as login
credentials or credit card
information, is protected from
interception by malware or other
threats.
Mohamed Ismail E

4.Malware protection: Cloud


browser isolation can be used to
protect against malware infections
by preventing malware from being
downloaded onto the user's
endpoint device. Any malware
encountered while browsing the
web is contained within the
isolated browsing session and is
unable to execute on the user's
endpoint device.
Mohamed Ismail E

5.Phishing protection: Cloud


browser isolation can be used to
protect against phishing attacks by
isolating the browsing session from
the user's endpoint device. This
prevents the user from
inadvertently downloading
malware or entering sensitive
information into a fake website.
Mohamed Ismail E

6. Compliance: Cloud browser


isolation can be used to help
organizations meet regulatory
compliance requirements, such as
those for the financial industry,
healthcare industry, and
government agencies. By isolating
the browsing session, organizations
can protect sensitive data and
prevent unauthorized access to
corporate resources.

You might also like