<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Digging Deeper Into Isolation

  1. We get it. You’re a bit leery. One hundred percent protection from web- and email-based attacks? With no impact on user experience or web browsing performance? No clients to install? No software to manage and update?

You’ve been sold this bill of goods before.

 

Nearly all security vendors claim that they’ve finally figured it out. Secure web gateways that monitor everything your users access on the web. Third-party threat intelligence powered by seasoned cybersecurity warriors. Internet separation that blocks the Internet from any device that has access to your corporate network. Virtual Desktop Infrastructure (VDI) solutions that render websites pixel by pixel on a user’s screen with all active content filtered out. The list goes on and on.

 

What makes us think Internet isolation is the panacea to today’s cybersecurity threats? After all, 100 percent protection is a bold promise.

 

We stand behind our solution because it works architecturally. It all comes down to how we handle the fetch, execute, and render functions when a user visits a website. In a nutshell, Internet isolation moves the fetch and execute functions to a remote cloud environment, leaving only the rendering function to run on the user’s web browser.

 

It works like this: First, the user clicks on a link and the web browser fetches the data stream, which is sent to the isolated cloud. There’s no attempt to classify the content or determine its risk factor—a process that could slow down performance. Instead, all content is assumed to be malicious and is isolated in the cloud environment. The code is then executed in the cloud—far from the user’s endpoint—and then only safe content is rendered to the user’s web browser. The page looks and feels identical to the original web page, thanks to the secret sauce built into Menlo’s Adaptive Clientless Rendering™ (ACR) technology. The only thing missing is the risk of a malware infection.

 

The result is a safe web browsing experience that looks, acts, and feels like the real Internet while reducing IT overhead and costs. It’s that simple.

 

The Twin Benefits of Internet Isolation

1. Native-Like Browsing Experience:

  • The rendering process carries clicks and keystrokes from the user’s device back to the cloud without the need for any endpoint software or plug-in.

  • Some browser functions such as CSS reflow are performed on the endpoint, resulting in fast page loads, smooth scrolling and animations, and crisp video playback.

  • The browser is also able to apply native fonts and UI widgets, regardless of browser version or platform.

  • Workflow operations such as copy-paste, find-replace, and printing are preserved through adaptive rendering technology.


 

2. Reduction in IT Overhead:

  • Internet isolation works and produces fewer trouble tickets and fewer security alerts.

  • It doesn’t require website categorization—a drain on IT resources—or generate help desk requests to unblock false positives.

  • There are fewer security incidents to clean up—including the reimaging of infected machines.

  • No additional software or clients are required, eliminating the need to issue patches or complete other maintenance tasks.

 

We’ve finally figured it out. The Menlo Security Internet Isolation Cloud provides 100 percent protection from web- and email-based threats by fundamentally changing the way browsers access the web. And we just so happened to reduce IT overhead and costs along the way.

 

DefinitiveGuide_InternetIsolation_CTA

Tags: Web Security, ZeroTrust, ZeroTrust Internet, Guide,, Internet Isolation

Connect with us

Lists by Topic

see all

Recent Posts