Overview

Digital Threats not only attack your users via corporate work emails, but also when they engage in personal browsing from their corporate devices. Proofpoint Browser Isolation is web isolation built with simplicity, based on intelligence from Targeted Attack Protection (TAP) Isolation. It helps lower your attack surface and provides complete browser security. Browser Isolation integrates with TAP to provide you with adaptive controls that allow corporate email to isolate URL clicks based on the risk profile of user or URL being clicked. Browser Isolation also allows your users to browse the web while preventing malicious content from impacting your corporate devices.

Features and Benefits

Gain Adaptive Controls with TAP Integration

Proofpoint Browser Isolation extends the capabilities of TAP. It does this by enabling risk-based isolation for URL clicks within corporate emails. With our unique approach to protecting people, we can highlight your most attacked people and determine the riskiest URLs that get into your users’ inboxes. By doing this, we can isolate risky URL clicks to help prevent threats and credential phish from impacting your organization. Browser Isolation:

  • Provides adaptive controls integrated with TAP to isolate URL clicks based on risk
  • Provides secure use of cloud collaboration tools, such as SharePoint and Dropbox
  • Allows your users to exit the isolated session of the URL they clicked within corporate email once it’s deemed safe by deep threat scans

Proofpoint Browser Isolation Demo

Realize Immediate IT Cost Savings

IT organizations struggle to manage and provide security for ‘uncategorized’ URLs within the corporate environment. Most organizations choose to either allow or block all, but neither solution is perfect. If all uncategorized sites are allowed, it can introduce threats into the organization. And if all sites are blocked, then IT administrators can end up being burdened by requests from users to get access to sites. Browser Isolation is simple to deploy and manage, and it empowers you to protect hundreds of thousands of users in days, rather than in weeks or months. Our cloud-based remote browser solution makes it easy for you to stay ahead of attackers. Browser Isolation:

  • Saves you money, eliminating the need for your IT team to manage uncategorized URLs
  • Protects all business and personal web browsing sessions
  • Requires no software installation, network configuration or management
  • Needs no registration (IP whitelist) or self-registration (email)

Leverage Advanced Web Browser Isolation Technology

With our advanced and proven threat intelligence capabilities, we can extend advanced email security to personal browsing and the broader web. All links inside Browser Isolation are rendered using URL isolation technology. This allows your people to safely and confidently browse the internet at work. Browser Isolation:

  • Includes Proofpoint Email Isolation
  • Defends against potentially malicious URL links in personal webmail with URL isolation technology
  • Does not allow external content, such as JavaScript or Active Content, to execute on corporate devices
  • Destroys user browser sessions when they are done and opens fresh browsers for every new session

Progressively Manage Personal Browsing

Browser Isolation simply works—without fail. Now you can respect the privacy of your people when they access webmail. And without worrying about additional risks to your organization. It's a win-win for everyone. Browser Isolation:

  • Provides near-zero security risk for your corporate assets, so there’s no need to inspect and track corporate and personal web traffic
  • Encrypts web traffic with network anonymization to protect your users’ identities
  • Protects employee privacy
  • Simplifies compliance

Enable Content Inspection and Security Monitoring Controls

It’s important to eliminate personal webmail and risky URLs as a source of cyber threats to help you reduce your potential exposure. Browser Isolation enables secure and robust data monitoring and collection programs without collecting your users’ personal data. It allows you to:

  • Monitor what matters without violating compliance standards
  • Inspect web traffic outside of Browser Isolation safely
  • Expand your cyber threat monitoring and control programs without worrying about remediating assets infected by malicious content from personal browsing