What Is Remote Browser Isolation?
Remote Browser Isolation (RBI) is an advanced cybersecurity technology that executes web browsing
activity on remote servers instead of user devices. Rather than downloading and rendering web content locally, RBI
systems process web pages in secure cloud environments and stream only safe, rendered content to the user.
This approach creates an “air gap” between potentially malicious web content and enterprise networks. Even if a user
visits a compromised website, malware cannot reach their device because no executable code ever runs locally.
How Remote Browser Isolation Works
The Core Principle
RBI isolates the browsing environment from the endpoint:
- User requests website – User clicks link or enters URL
- Remote execution – Request routes to RBI service, which retrieves and renders page
- Content transformation – Active content (JavaScript, plugins) executes remotely
- Safe streaming – Only rendered output (pixels or safe HTML) reaches user device
- Session termination – Container destroyed after session, eliminating any malware
RBI Architectures
Pixel Streaming (Full Isolation):
The most secure approach – only rendered pixels reach the endpoint. The remote browser sends a video stream of the
web page. All code execution happens entirely in the cloud. Highest security but requires more bandwidth.
DOM Reconstruction:
The RBI system processes web content, strips dangerous elements, and sends a reconstructed safe version to the
client. Lower bandwidth but maintains some web code on the endpoint.
PDF/Read-Only Rendering:
Converts web pages to static images or PDFs. Extremely secure but limited functionality – forms and interactive
elements don’t work.
Deployment Models
Cloud-Based RBI:
- RBI servers hosted by vendor in their cloud
- Fastest deployment, automatic scaling
- Data transits through vendor infrastructure
- Best for most organizations
On-Premises RBI:
- RBI infrastructure deployed in organization’s data center
- Maximum control over data paths
- Higher implementation complexity
- Suitable for high-security environments
Hybrid Deployment:
- Sensitive sites isolated on-prem, general browsing through cloud
- Balances security with cost and complexity
Why Organizations Need Remote Browser Isolation
The Browser Attack Surface
Web browsers are the primary attack vector for modern threats:
- 90%+ of cyberattacks begin with phishing or malicious websites
- Zero-day exploits target browser vulnerabilities before patches exist
- Drive-by downloads install malware without user interaction
- JavaScript-based attacks execute in browser memory
- Fileless malware evades traditional antivirus
Limitations of Traditional Security
Conventional security tools struggle against modern web threats:
URL Filtering: Only blocks known-bad sites. Newly compromised sites pass through until categorized.
Sandboxed Analysis: Delays delivery while analyzing content. Sophisticated malware detects sandboxes
and delays malicious behavior.
Endpoint Protection: Reacts after malware reaches the device. Cannot prevent zero-day attacks.
RBI Advantage: All web content is treated as potentially malicious. No categorization delays, no
reliance on threat intelligence, no code execution on endpoints.
Key Benefits of Remote Browser Isolation
1. Zero-Trust Web Security
RBI implements true zero-trust for web content:
- No website is implicitly trusted
- All content rendered in isolation
- Malware cannot reach endpoints regardless of source
- Protection against unknown (zero-day) threats
2. Phishing Protection
RBI prevents credential theft from phishing sites:
- Phishing pages render remotely, unable to capture keystrokes
- Credential isolation prevents password submission to malicious sites
- Read-only mode for uncategorized sites prevents any form submission
3. Ransomware Prevention
Ransomware cannot reach enterprise systems:
- Malicious downloads execute in disposable containers
- Ransomware has no access to enterprise files
- Container destroyed after session – malware eliminated
4. Safe Access to Risky Sites
Organizations can allow access to necessary but risky sites:
- Personal webmail for employees
- Social media platforms
- Uncategorized/unknown websites
- Sites flagged as potentially unsafe
5. Data Loss Prevention
RBI can enforce DLP policies for web content:
- Disable copy/paste of sensitive content
- Prevent downloads to local devices
- Control file uploads to web applications
- Mask sensitive data displayed on screen
Top Remote Browser Isolation Solutions
1. Zscaler Browser Isolation
Best for: Organizations already using Zscaler’s security platform
Integrated into Zscaler’s Zero Trust Exchange, providing seamless RBI as part of a comprehensive secure web gateway.
Pixel streaming architecture with AI-powered isolation policies.
Key features:
- Integration with Zscaler Private Access
- Unified policy management
- Any-device, any-location coverage
2. Cloudflare Browser Isolation
Best for: Organizations prioritizing performance
Cloudflare’s network of edge locations provides low-latency isolation globally. Uses a DOM-based approach that
transmits only safe drawing commands.
Key features:
- Network vector rendering for performance
- Integration with Cloudflare Access
- Edge computing for minimal latency
3. Menlo Security
Best for: Enterprises requiring comprehensive isolation
Pioneer in the RBI space with patented Isolation Core™ platform. Comprehensive document isolation including email
attachments.
Key features:
- Document isolation (Office, PDF)
- Email attachment isolation
- Clientless deployment
4. ericom Shield
Best for: Organizations needing flexible deployment
Offers both cloud and on-premises deployment options. Linux container-based architecture with efficient resource
utilization.
Key features:
- On-prem or cloud deployment
- Integration with existing proxies
- File sanitization
5. Send.win Cloud Browser
Best for: Multi-account management and browser isolation for individuals/teams
While enterprise RBI solutions focus on threat protection, Send.win provides cloud browser isolation
with additional privacy features for multi-account use cases.
Key features:
- Complete browser isolation from local device
- Unique fingerprints per browser profile
- Proxy integration per profile
- Session sharing for team collaboration
Remote Browser Isolation Use Cases
Enterprise Security
Large organizations deploy RBI to:
- Protect against phishing and web-based malware
- Safely enable personal web use policies
- Secure contractor and third-party access
- Protect against supply chain attacks via compromised websites
Financial Services
Banks and financial institutions use RBI to:
- Protect trading desktops from web threats
- Enable research access while preventing data exfiltration
- Comply with regulatory requirements for isolation
Healthcare
Healthcare organizations implement RBI for:
- HIPAA-compliant web access
- Protecting clinical workstations
- Preventing ransomware attacks on patient systems
Government
Government agencies deploy RBI to:
- Protect classified and sensitive systems
- Enable open-source intelligence research
- Secure remote work for distributed agencies
Digital Marketing and E-commerce
Marketing professionals and sellers use browser isolation for:
- Safely managing multiple platform accounts
- Competitive research without fingerprint exposure
- Testing campaigns across isolated environments
Implementing Remote Browser Isolation
Step 1: Define Your Use Cases
Determine which activities require isolation:
- Full isolation: All web browsing through RBI
- Selective isolation: Uncategorized, personal, or risky sites only
- High-risk focus: Webmail, social media, unknown links
Step 2: Evaluate Solutions
Consider these factors:
- Architecture: Pixel streaming vs. DOM reconstruction
- Deployment: Cloud, on-premises, or hybrid
- Integration: Compatibility with existing security stack
- Performance: Latency impact on user experience
- Coverage: Global availability for distributed workforce
Step 3: Pilot Program
Start with a controlled pilot:
- Select representative user groups
- Begin with selective isolation policies
- Gather feedback on performance and usability
- Monitor security metrics and blocked threats
Step 4: Develop Policies
Create policies for different scenarios:
- Which sites require full isolation
- Download and upload restrictions
- Copy/paste controls
- Session timeout settings
- Exception handling for trusted applications
Step 5: User Training
Prepare users for the new experience:
- Explain the security benefits
- Address performance expectations
- Provide troubleshooting guidance
- Establish feedback channels
Challenges and Considerations
Performance Impact
Challenge: Pixel streaming adds latency and feels less responsive.
Mitigation: Choose vendors with edge presence near your users. Consider DOM-based approaches for
performance-sensitive workflows. Implement selective isolation to limit impact.
Application Compatibility
Challenge: Some web applications don’t work well through isolation.
Mitigation: Test critical applications during pilot. Create exceptions for trusted, necessary
applications. Work with vendor on compatibility issues.
Cost
Challenge: RBI solutions typically cost $5-20 per user/month.
Mitigation: Compare against breach costs and existing security spending. Consider selective
isolation to reduce scope. Evaluate bundled offerings from existing security vendors.
User Acceptance
Challenge: Users may resist changes to browsing experience.
Mitigation: Communicate security benefits. Ensure adequate performance. Address feedback quickly.
Start with high-risk activities where security benefit is obvious.
Frequently Asked Questions
Does RBI slow down web browsing?
Some latency is inherent in remote rendering, but modern RBI solutions minimize impact. DOM-based approaches feel
nearly native. Pixel streaming may add 50-100ms latency. Geographic proximity to RBI servers is crucial – choose
vendors with global edge presence.
Can RBI protect against all web threats?
RBI prevents malware execution and credential theft via phishing. However, it doesn’t prevent social engineering that
tricks users into providing information they shouldn’t share legally. RBI should be part of a layered security
strategy including user awareness training.
How does RBI handle file downloads?
RBI solutions offer various download handling options: block all downloads, sanitize files (strip active content),
scan before release, or allow with logging. Cloud storage integration can receive files directly without touching
endpoints.
Is RBI the same as VDI?
No. Virtual Desktop Infrastructure (VDI) provides complete virtual desktops. RBI isolates only browser activity. RBI
is more targeted and typically less costly, but VDI provides broader application isolation when needed.
Can employees bypass RBI?
Proper deployment routes all web traffic through the RBI service. Network controls prevent direct internet access.
However, determined users with personal devices or mobile hotspots can bypass corporate controls – policy and
monitoring remain important.
Conclusion
Remote Browser Isolation represents a fundamental shift in web security philosophy – from trying to identify threats
to assuming all web content is potentially harmful. By executing browser activity in disposable cloud containers,
RBI eliminates entire categories of attacks that traditional security cannot address.
For organizations facing sophisticated web-based threats, RBI provides protection that signature-based and behavioral
security tools cannot match. The technology has matured significantly, with solutions available for organizations of
all sizes.
For individuals and teams focused on multi-account management and browser privacy, solutions like
Send.win provide browser isolation benefits along with fingerprint management and profile
separation. Try Send.win’s free demo to experience cloud browser isolation firsthand.
Whether implementing enterprise RBI or using cloud browser tools for personal work, isolation is the future of web
security.
How Send.win Helps You Master Remote Browser Isolation
Send.win makes Remote Browser Isolation simple and secure with powerful browser isolation technology:
- Browser Isolation – Every tab runs in a sandboxed environment
- Cloud Sync – Access your sessions from any device
- Multi-Account Management – Manage unlimited accounts safely
- No Installation Required – Works instantly in your browser
- Affordable Pricing – Enterprise features without enterprise costs
Try Send.win Free – No Credit Card Required
Experience the power of browser isolation with our free demo:
- Instant Access – Start testing in seconds
- Full Features – Try all capabilities
- Secure – Bank-level encryption
- Cross-Platform – Works on desktop, mobile, tablet
- 14-Day Money-Back Guarantee
Ready to upgrade? View pricing plans starting at just $9/month.
