Menlo Security Named a Leader & Outperformer in the GigaOm Radar for ZTNA
Icon Rounded Closed - BRIX Templates

Threat Prevention Starts in the Menlo Cloud

The Most Effective Solution to Stop
Zero-Day Phishing, Ransomware, and Malware.  

Young businesswoman working on a laptop in an office.

Remote Browser Isolation Has a Bad Reputation.

Cloud? Yes. Pixel-Streaming? No.

Everyone loves the cloud for the same reasons: elastic scale, centralization, agility, collaboration, and access to advanced technology sooner. So why does cloud-based remote browser isolation (RBI) have a bad reputation?

There has to be a better way to get cloud-based browser security, and there is: Menlo Cloud-Based Browser Security.

Advanced Technology Enables Cloud-Based Browser Security

The Right Cloud-Based Browser Security Delivers Pre-Emptive Protection That Works

For any browser, and for every user, in every location, Menlo creates a secure digital twin browser in the cloud. What happens next is the advanced technology that enables cloud-based browser security to work for the modern web. Menlo Advanced Cloud-Based Browser Security is enabled by patented Adaptive Clientless Rendering.

Advanced RBI that Scales and Works for All Apps and Users

Business meeting of two employees, Asian and female colleagues, discussing the project, working in a modern office, looking at a laptop screen, discussing edits, and project success

Global Proof

Replacing legacy RBI with Advanced Cloud-Based Browser Security has worked for thousands of organizations worldwide. You do not have to accept insecure, endpoint-based browser security. You can enjoy all the benefits that cloud delivers applied to browser security.

Preemptive browser security requires cloud interception of threats. But it has to be done right, and that’s what the Menlo Cloud delivers: Advanced Browser Security that leverages endpoint rendering for efficiency and scale.

Advanced Cloud-Based Browser Security
Secures the Modern Web

The enterprise security team always faces conflicting mandates: security and a combination of user satisfaction and efficiency. Advanced cloud-based browser security helps security teams fulfill them all. Unlike replacement browsers, advanced cloud-based browser security works with any web application, on endpoint browser, for every type of user, anywhere they work. Read about typical pixel-stream limitations. Read about performance and compatibility problems with replacement browsers.

A secure browser icon with a checkmark over a cloud, symbolizing 'Menlo Threat Prevention and Secure Application Access'. This represents how the Secure Cloud Browser prevents threats by removing active code and sending only safe HTML to internal applications.

Menlo Threat Prevention and
Secure Application Access

From a use-case perspective, the Menlo Cloud is used for both Menlo Threat Prevention and Menlo Secure Application Access. The solution elements described above are used directly in our offerings:

The Menlo Cloud prevent threats to users, their organizations and internal web applications by removing active code from web content, delivering only safe web content to web browsers. Efficient endpoint rendering enables use cases like VDI reduction, even across the WAN.

Secure Access to internal applications is routed from users' browsers through the Menlo Cloud, sending only safe HTML to internal applications.

Agentless Works for Everyone

Another security team mandate is the requirement to cover differing user communities. Some communities create challenges for other forms of browser security that require endpoint installation: BYOD, contractors, and team members coming aboard through mergers and acquisitions.

While most legacy, pixel stream RBI is architecturally agentless, the vendors that provide that aging technology almost always have a client, if for nothing else than ZTNA. A core architectural feature of the Menlo Cloud is that it does not require endpoint software installation. No Agents. No clients. No libraries. No kernel elements. No endpoint software to maintain. Traffic routing to the Menlo Cloud is non-disruptive, using mechanisms you already use and know. Menlo ZTNA is agentless as well.

A smiling professional works on her laptop, representing how an 'Agentless' security solution 'Works for Everyone'. This symbolizes a secure, non-invasive approach that requires no endpoint software to maintain, covering all user types like BYOD and contractors
A diagram showing a secure cloud icon connecting to various browsers like Chrome, Firefox, and Edge. This image represents 'Any Browser, Any Application' support, where cloud-based security works for all web apps and supports every browser without compromising productivity.

Any Browser, Any Application

The desktop team knows that user preferences are real. iPhone and Android? Yes. PC and Mac? Sure. But what about Safari, Firefox, and Microsoft Edge?

Replacement browsers force users into a specific browser, overriding their preferences and compromising productivity.

Advanced Cloud-Based Browser Security supports any browser. Sure, legacy RBI supports any browser but it fails to scale and breaks applications. Every browser is supported with advanced browser security that also works for all web applications, even the most modern, that legacy RBI sometimes cannot render properly.

Browser Security that Satisfies the Compliance Team

Many organizations have one too many regulations with which to comply, a problem that is massively exacerbated for global organizations. Your organization potentially requires compliance review for security solutions. What happens when the compliance team sees that the source code for browser security is visible on the endpoint, for all the world to see? This is occasionally seen with both replacement browsers and extensions offering browser security.

Advanced Cloud-Based Browser Security operates with secure code in a highly secure environment. Only lightweight Javascript enables endpoint rendering with security. Your compliance team can trust and verify that Menlo Security is much less likely to be breached than endpoint browser security solutions.

An IT compliance manager has definitive proof of security, satisfying audit requirements. This visual represents how cloud-based browser security operates with secure code in the cloud, removing the ambiguity and risk of endpoint-visible source code.

Menlo Focuses on Securing the Browser, Because That's Where Most Enterprise Work Takes Place  

Discover why organizations around the world rely on Menlo Security to protect the enterprise and enable secure access to applications, preventing attacks that legacy security tools cannot stop.

"Menlo was easy to roll out and integrates well with our security and technology stack in the cloud.”

Alex Ooi

Chief Information Security Officer, Digital Nasional Berhad (DNB)

“To employees, Menlo  is completely transparent, allowing users to navigate a completely functional web resource.”

Premier Miton

UK Based Investment Management Company

“…allows Synapxe to protect its assets from malicious threats without impacting the native user experience.“

Synapxe

Health Tech Agency of Singapore

“I wanted a layered approach that would protect users from web-based threats without slowing down their ability to get work done.”

Dane Zielinski

InfoSec Manager, Jacobson Holdings

“The platform has decreased our remediation needs, while reducing patch pressure.”

Alan Goh

Chief Information Officer, M1 Communications

“Menlo Security helped us eliminate the possibility of a malware infection, rather than just detecting and removing an infection.”

Koichi Sekiguchi

ICT Planning Team Leader, Tokio Marine dR Co., LTD

“Before, we had to manually examine every single potential malware problem. Now, my job is much easier…with the Menlo Secure Cloud Browser.”

François Gasser

IT Security Officer, Gösgen Nuclear Power Plant

“Menlo takes care of all the unknown risks running rampant around the internet.”

Top Credit Card Issuer

Senior Cybersecurity Architect

“Zero-client,easy scaling, and cloud provisioned versus appliance.”

Karl Kemp

Information Security Officer

“Menlo Secure Cloud Browser provided the scalability to ensure that users world wide have the same transparent experience and unyielding protection.”

MTR Corporation

“[Menlo has] eliminated the need to manually apply and update policies across an increasingly distributed IT infrastructure.”

Fortune 100 Financial Services Firm

“Menlo provides protection from email-based malware embedded in links and attachments without impacting the user’s native email experience.”

Fortune 50 Global Investment Firm

Frequently Asked Questions

Answers to the burning questions in your mind.

Have a different question?
Contact Us!
White rounded Arrow pointing Up to the right diagonaly
Is Menlo a Browser?
Violet Plus Mark

Menlo is not a replacement browser for the endpoint. There is no upside to replacing the endpoint browser as discussed in our blog series part 1 and part 2.

Rather, to accomplish cloud-based browser security, Menlo instantiates a hardened digital twin of the user's local browser. This twin fetches and executes and examines all browser traffic on behalf of the user's local browser. Then:

- Browser page content is delivered using patented Adaptive Clientless Rendering with many benefits, including high performance leveraging endpoint rendering and broad web application compatibility. Legacy RBI pixel streaming provides none of those benefits. Replacement browsers disable crucial endpoint rendering technology, which compromises performance and breaks web application function.

- Web traffic Archives are unpacked and their embedded files, as well as the files themselves, are all inspected and sanitized before delivering to the user's browser.

Instead of buying a browser, you are buying preemptive browser security!

Which browsers does Menlo isolate?
Violet Plus Mark

Menlo isolates all browsers. The solution is browser-agnostic, meaning it works with and secures any local browser the user selects, including mainstream browsers like Chrome and Edge, as well as new AI-powered browsers and specialized extensions. The Menlo Cloud runs a digital twin of the local browser in the cloud, isolating all web content execution away from the endpoint, regardless of the user's browser choice.

How is Menlo's isolation better than legacy, pixel-streaming RBI offerings?
Violet Plus Mark

Unlike legacy, pixel-streaming RBI offerings, Menlo Security leverages patented technology called Adaptive Clientless Rendering (ACR). ACR leverages Document Object Model (DOM) mirroring to transmit clean, lightweight web content to the endpoint to leverage the power of endpoint rendering. This approach preserves browser choice and enables secure, compatible browsing for the most complex web applications.

What are the benefits of browser isolation in the cloud?
Violet Plus Mark

The primary benefit of cloud-based browser security is preemptive security that eliminates the local browser attack surface by loading and executing all web content in the cloud, ensuring that threats and malware embedded in active page content and in files never reach the user's device. Other benefits of cloud-based isolation leveraging advanced technology like ACR, rather than pixel streaming, include very high performance and low latency delivering content and files.

What are the drawbacks of remote browser isolation?
Violet Plus Mark

There are no drawbacks to remote browser isolation if it provides high security, high performance, and low latency, and, in particular, if security is transparent to end users. Menlo Advanced RBI has these characteristics.

Legacy RBI that depends on outdated pixel-streaming that was originally invented for purposes other than web browsing has many drawbacks including poor compatibility, poor performance, and painful limitations.

How can I be sure that latency is minimized when I'm using your cloud-based browser security solution?
Violet Plus Mark

Unlike some legacy pixel-streaming RBI offerings stranded in a private cloud architecture, Menlo leverages leading public cloud providers. Menlo Cloud services are provided by 15 data centers worldwide equipped with ultra-fast internet connections to ensure low latency.

See How Menlo Security Protects You

Self-Guided Tour

Take a self-guided tour to observe some of the ways that Menlo products enable secure app access, block sophisticated attacks, and provide critical insight into browsing sessions.

See Guided Tours and More

See How Menlo Security Protects You

See exactly how Menlo can be tailored to solve your unique security challenges. We offer a live demo customized to your teamʼs goals, showing you how to secure your stack and protect your users. A truly secure browsing experience is one click away.

Schedule a Custom Demo
Mac laptop with Menlo Secure Application Access UI on screen