Menlo+Votiro_Logo Lockup
Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises
Icon Rounded Closed - BRIX Templates

Considerations on Closing the Browser Security Gap, Part 5: Doing RBI Right

|
January 29, 2026

Executive Summary

The web browser is the primary target for sophisticated "HEAT" (Highly Evasive Adaptive Threats) attacks. Replacement browsers, such as those from Island and Palo Alto/Talon, fail to protect against such attacks because they still execute active web code locally, retaining the formidable security debt of the Chromium engine and suffering from local logic fragility and operational friction.

While Remote Browser Isolation (RBI) moves execution to the cloud for security, legacy pixel-streaming RBI delivers a compromised user experience due to lag, latency, and broken web functionality. Menlo Security solved this with Adaptive Clientless Rendering (ACR), which executes content in a disposable cloud container and sends safe rendering instructions to the user's native browser via DOM Mirroring. This architecture provides cloud-based security with native speed, respecting user choice, and enabling efficient, clientless deployment, proving that true Zero Trust requires a return to the cloud with the right architecture.

Introduction

This article is part five of a multi-part series. Part 1 explains how selecting the right browser security architecture is critically important. Part 2 covered the risks that replacement browsers impose on organizational and user choice. Part 3 discussed GenAI security. Part 4 was about security for internal web-based applications. The series explains why replacement browsers cannot deliver browser security, and in each article, we explain why cloud-based browser security can and does deliver preemptive browser security. Having brought you to the cloud, we owe you an explanation on how to do cloud-based security right.

The web browser is the mission-critical super-app of the modern organization, serving as the gateway to SaaS, internal applications, and the vast expanse of the public internet. But the browser’s central role has also made it the ultimate target for sophisticated "HEAT", or Highly Evasive Adaptive Threats that easily bypass traditional security stacks.

As organizations scramble to close this browser security gap, the industry has cycled through various architectural attempts to fix the problem. Understanding how to do browser security right requires a quick history of some failures and why a cloud-isolated, adaptive approach is ultimately the only truly secure path forward.

The Allure and Failure of Replacement Browsers

The latest trend in the market involves replacement browsers from players like Island and Palo Alto/Talon, or browser extensions from companies like Seraphic. These solutions argue that the best way to secure the browser is to control the browser itself on the user’s device.

The replacement browser pitch is tempting: a hardened version of Chromium with extended file and archive security and Data Loss Prevention (DLP). But these solutions face a series of insurmountable architectural hurdles:

  • The Persistence of Local Risk: Replacement browsers still execute active web code—the primary vector for exploits—directly on the user's endpoint. As endpoint software, they inherit the formidable security debt of the Chromium engine. If a zero-day exploit escapes the browser sandbox, it has native access to the device’s memory and operating system.
  • The Fragility of "Local Logic": The security controls in replacement browsers (like clipboard blocking or data redaction) are enforced by code running on the same untrusted device it is trying to protect. As demonstrated by security researchers, if a user or attacker gains elevated permissions on that device, they can simply rename or delete the local JavaScript files that contain the security logic, rendering the "Enterprise Browser" essentially defenseless, at least for a period of time.
  • Operational Friction and Performance: Hardening replacement browsers often requires disabling crucially important high-performance features like JIT (Just-In-Time) compilation, which significantly slows down modern, compute-heavy web applications. Furthermore, forcing users to switch from their preferred browser (Chrome, Safari, Edge) to a proprietary alternative creates massive friction and, in some cases, a mounting pile of IT support tickets.

A Brief History: From Pixel Streaming to the Endpoint and Back

To understand the current battle between endpoint and cloud-based browser security, we have to look at the history of Remote Browser Isolation (RBI). Long before replacement "Enterprise Browsers" existed, the security industry recognized that the only way to be 100% safe was to move the execution of web code off the endpoint and into the cloud.

The Era of Legacy RBI (Pixel Streaming)

The first generation of RBI solutions attempted to solve the problem using pixel streaming—essentially treating the browser like a remote video session (similar to VDI). The remote browser rendered the page in the cloud and then "scraped" the screen, sending a stream of pixels down to the user.

While this provided a high degree of security by creating a virtual air gap, the user experience was often disastrous. Pixel streaming is notoriously bandwidth-heavy, introducing lag and latency that make scrolling and typing feel mushy, and even worse in remote locations. It also fundamentally broke the web: because the local browser only saw a stream of screen scrapes, in many cases, common functions like printing, copy-paste, and "find-in-page" simply didn't work. Further, unlike VDI, which is used for screen-scraping and occasionally file downloads from trusted internal applications, the web carries a vast amount of file and archive traffic that carries huge risks of embedded malware. First-generation RBI treatment of web-borne files and archives is, in a word, ghastly.

The Innovation: Advanced RBI and Menlo ACR

In the midst of widespread customer frustration with these pixel-pushers, Menlo Security invented a more advanced form of RBI. Rather than pushing pixels, Menlo developed Adaptive Clientless Rendering™ (ACR).

ACR revolutionized RBI by separating the execution of the web page, which occurs safely in the cloud, from the rendering, which leverages powerful endpoint graphics resources. ACR executes all web content in a disposable cloud container and only sends safe, transcoded rendering instructions (using a technology called DOM Mirroring) to the user’s local browser. ACR enables users to stay in their native browser and enjoy 100% performance without the risk of local execution.

The Endpoint Detour

As Advanced RBI was proving it could scale to tens of thousands and even millions of users, players like Island and Seraphic entered the market. They proposed a "U-turn" back to the endpoint, suggesting that local browser management could replace the need for cloud isolation. However, as we’ve seen, this "new" approach just reintroduced the very local-execution risks and management headaches that RBI was designed to eliminate in the first place.

Cloud-Based Browser Security is the Right Path. It has to be done right.

Today, the market is realizing that the endpoint is a compromised battleground. The only way to provide true Zero Trust is to return to the cloud, but use an architecture that does not break the user experience. Here are some ways that ACR fulfills such an architecture:

  1. DOM Mirroring: Unlike the pixel-streaming of the past, Menlo ACR uses DOM Mirroring. The Menlo Cloud maintains a hardened digital twin of the user’s browser, filters out active content (like <script> tags or onclick attributes) and sends only the benign, safe DOM tree to the user.
  2. Native Speed, Cloud Security: Because the rendering work—like scrolling and animations—is offloaded to the endpoint’s own GPU, the experience is indistinguishable from native browsing.
  3. Respecting user choice and enabling IT efficiency: Doing RBI right means not forcing a change in behavior. Menlo Security works on any browser, on any device (managed or unmanaged), with no software to install. This clientless nature allows for enterprise-wide deployment in minutes, not months. IT teams no longer have to manage a secondary browser or worry about destabilizing the endpoint with intrusive agents.
  4. Network Efficient: ACR lightweight rendering updates dramatically reduce latency relative to first-generation RBI, enabling users to work anywhere from the office to a coffee shop to a remote Airbnb.

Conclusion 

The history of browser security is a journey toward finding the perfect balance between absolute protection and a native user experience. We have learned that local hardening is a house of cards, and that legacy pixel-streaming is too clunky for the modern web.

True browser security requires an architecture that is cloud-native by design but local-feeling in execution. Menlo Security Adaptive Clientless Rendering enables cloud-based browser security and allows organizations to embrace the web without compromise.

Menlo Security

menlo security logo
linkedin logotwitter/x logoSocial share icon via eMail