Insights for CISOs: Web Isolation Technology

Insights for CISOs: Web Isolation Technology

A Proactive Zero-Trust Approach to Web Security

RELEASE DATE
14-Dec-2021
REGION
Global
Deliverable Type
Market Research
Research Code: MG54-01-00-00-00
SKU: IT04437-GL-MT_26081
AvailableYesPDF Download
$2,450.00
In stock
SKU
IT04437-GL-MT_26081
$2,450.00
DownloadLink
Purchase includes:
  • Report download
  • Growth dialog™ with our experts
Need more details?

Description

The concept of Security by Isolation aims to reduce the impact of cyberattacks by physically separating a user's system, OS, browser, or email from their local machine or the enterprise server. As a result, even if the security of one of the systems is compromised, the impact does not percolate to the rest of the infrastructure.

The principle of Security by Isolation has been around for decades. The earliest example of the isolation concept was Virtual Desktop Infrastructures (VDI). The VDI hosts a desktop operating system within a virtual machine (VM) running on a centralized server. Users access the remote desktop through a login portal. Any risky website access or malicious download happens on the remote desktop and not the central server.

Since then, security isolation technologies have gone through many iterations. Today, the focus is on isolating the user's endpoint from the web, which represents a vast attack surface. The browser often acts as the entry point for cyber adversaries to inject malware, steal data, or disrupt services. Air-gapped systems, network segmentation, and virtual private networks are few examples of solutions that leverage the concept of security by isolation. However, operational complexity and poor user experience drove the emergence of web isolation platforms.

Web isolation platforms can be classified based on the type of application being isolated – Browser, Email, Document, and cloud-based application. Although browser and Remote Browser Isolation (RBI) are the most popular web isolation platforms, other types such as email, document, and application isolation are beginning to witness significant demand.

Table of Contents

Insights for CISOs: Web Isolation Technology

  • Insights for CISOs: Web Isolation Technology

Growth dialog™

A tailored session with you where we identify the:
  • Strategic Imperatives
  • Growth Opportunities
  • Best Practices
  • Companies to Action

Impacting your company's future growth potential.

The concept of Security by Isolation aims to reduce the impact of cyberattacks by physically separating a user's system, OS, browser, or email from their local machine or the enterprise server. As a result, even if the security of one of the systems is compromised, the impact does not percolate to the rest of the infrastructure. The principle of Security by Isolation has been around for decades. The earliest example of the isolation concept was Virtual Desktop Infrastructures (VDI). The VDI hosts a desktop operating system within a virtual machine (VM) running on a centralized server. Users access the remote desktop through a login portal. Any risky website access or malicious download happens on the remote desktop and not the central server. Since then, security isolation technologies have gone through many iterations. Today, the focus is on isolating the user's endpoint from the web, which represents a vast attack surface. The browser often acts as the entry point for cyber adversaries to inject malware, steal data, or disrupt services. Air-gapped systems, network segmentation, and virtual private networks are few examples of solutions that leverage the concept of security by isolation. However, operational complexity and poor user experience drove the emergence of web isolation platforms. Web isolation platforms can be classified based on the type of application being isolated – Browser, Email, Document, and cloud-based application. Although browser and Remote Browser Isolation (RBI) are the most popular web isolation platforms, other types such as email, document, and application isolation are beginning to witness significant demand.
More Information
Deliverable Type Market Research
Author Swetha Ramachandran Krishnamoorthi
GPS Codes 9659
Industries Information Technology
No Index No
Is Prebook No
Podcast No
WIP Number MG54-01-00-00-00