Product :

About Ericom

94% of businesses have had malware delivered by email, and 23% report malware entering via the web*. Detection-based solutions are powerless against unknown
or zero-day threats. Credential theft-sites are removed before they can be categorized as malicious – but not before phishing emails lure users in.

Ericom Shield Remote Browser Isolation empowers users to securely and efficiently access the essential web-based tools of every modern business – websites and email — without the risk of malware attacks or credential theft and without investment in costly infrastructure.

Ericom's Benefits


More Secure

Basing RBI policies on URL categorization data is a useful first-pass filtering approach. Certainly, a potentially risky site should not be browsed without isolation. But depending solely on categorization data means trusting other defenses to identify risky content – exposing organizations to unnecessary cyber-risk. Assessing the threat level of every website requested, regardless of category, and applying RBI where needed, dramatically improves security


Simple for IT

Choose “Intelligent Isolation” as your policy and Ericom’s cloud RBI service does the rest. IT and security teams no longer need to invest scarce time and manpower in the never-ending, resource-intensive process of adapting policies in a cat-and-mouse game with attackers. Depend on Ericom to bring comprehensive threat intelligence and RBI to bear to keep malware off your devices


Easy for Users

Users can securely access all the sites they need to in order to accomplish their work, risk-free. With IT secure in the knowledge that the organization is protected from web threats, users will no longer experience the frustration of coming up against blocked websites, having to call IT help desks to request access, and waiting out delays in doing their work


More Efficient

Focus the power of Remote Browser Isolation on the area where it is most needed – the risky websites that lead to compromised devices, disrupted networks, and lost data. Real-time threat intelligence allows your security team to surgically apply RBI to the users and the activity that represents the highest risk to your organization