Browser Isolation

Cloud Security


Digital Threats not only attack your users via corporate work emails, but also when they engage in personal browsing from their corporate devices. Proofpoint Isolation is web isolation built with simplicity, based on intelligence from Targeted Attack Protection (TAP) Isolation. It helps lower your attack surface and provides complete browser security. Isolation integrates with TAP to provide you with adaptive controls that allow corporate email to isolate URL clicks based on the risk profile of user or URL being clicked.

Demo

Proofpoint Isolation

Proofpoint Isolation allows your users to browse the web while preventing malicious content from impacting your corporate devices.

Watch the Demo

Leverage Advanced Web Isolation Technology

With our advanced and proven threat intelligence capabilities, we can extend advanced email security to personal browsing and the broader web. All links inside Isolation are rendered using URL isolation technology. This allows your people to safely and confidently browse the internet at work. Isolation:

  • Defends against potentially malicious URL links in personal webmail with URL isolation technology
  • Does not allow external content, such as JavaScript or Active Content, to execute on corporate devices
  • Destroys user browser sessions when they are done and opens fresh browsers for every new session

Features and Benefits

Realise Immediate IT Cost Savings

IT organisations struggle to manage and provide security for ‘uncategorised’ URLs within the corporate environment. Most organisations choose to either allow or block all, but neither solution is perfect. If all uncategorised sites are allowed, it can introduce threats into the organisation. And if all sites are blocked, then IT administrators can end up being burdened by requests from users to get access to sites. Proofpoint Isolation is simple to deploy and manage, and it empowers you to protect hundreds of thousands of users in days, rather than in weeks or months. Our cloud-based remote browser solution makes it easy for you to stay ahead of attackers. Proofpoint Isolation:

  • Saves you money, eliminating the need for your IT team to manage uncategorised URLs
  • Protects all business and personal web browsing sessions
  • Requires no software installation, network configuration or management
  • Needs no registration (IP whitelist) or self-registration (email)
  • Apply granular controls to high risk profiles and/or existing groups that have been imported from Proofpoint Email Protection

Progressively Manage Personal Browsing

Proofpoint Isolation simply works—without fail. Now you can respect the privacy of your people when they access webmail. And without worrying about additional risks to your organisation. It's a win-win for everyone. Proofpoint Isolation:

  • Provides near-zero security risk for your corporate assets, so there’s no need to inspect and track corporate and personal web traffic
  • Encrypts web traffic with network anonymisation to protect your users’ identities
  • Protects employee privacy
  • Simplifies compliance

Enable Content Inspection and Security Monitoring Controls

It’s important to eliminate personal webmail and risky URLs as a source of cyber threats to help you reduce your potential exposure. Proofpoint Isolation enables secure and robust data monitoring and collection programmes without collecting your users’ personal data. It allows you to:

  • Monitor what matters without violating compliance standards
  • Inspect web traffic outside of Proofpoint Isolation safely
  • Expand your cyber threat monitoring and control programmes without worrying about remediating assets infected by malicious content from personal browsing

Web Isolation Technology

Our advanced and proven web isolation and threat intelligence capabilities give you visibility into threats that target your most important asset—your people. So you can rest assured that you are secured against webmail threats. Proofpoint Isolation:

  • Never downloads source documents carrying potential payloads or malicious macros
  • Protects your users from phishing attacks in personal webmail
  • Re-renders attachment files into HTML5
  • Defends against potentially malicious URL links in personal webmail with URL isolation technology
  • Does not allow external content, such as JavaScript or Active Content, to execute on corporate devices
  • Allows you to set policies to manage potentially risky actions, such as downloads, uploads, or copy and paste
  • Leverages the Proofpoint Nexus Threat Graph, which provides industry-leading correlation of threat data across email, cloud, network and social for real-time threat protection

Ready to give Proofpoint Cloud Security a try?

Let us show you how we protect your cloud access, users and data with our platform.