Zscaler Cloud Browser Isolation
Zscaler Cloud Browser Isolation
Zscaler Cloud Browser Isolation reduces web-based threats and protects executives and
users with access to sensitive data from the risks of data exfiltration.
Internet browsing is drastically increasing the attack surface
According to Gartner estimates1, 98 percent of external attacks are carried out over the public internet and, of those attacks, 80
percent are targeted directly at end users through their browsers, making browsers the largest surface area for threats.
Executives, finance teams, and other high-risk functions are prime targets for hackers. They have access to the most sensitive
information in an organization. Browser-based attacks and malicious active content hidden in webpages, vulnerable browsers,
and plugins provide a convenient means to deliver ransomware, phishing attacks, and other advanced threats, as well as to
extract sensitive data. Many organizations struggle to give users access to the webpages they need to successfully run their
business while still protecting them and reducing the potential for data exfiltration and damage to the organization.
But, blocking all potentially risky websites is not a practical approach to protecting users from web-based attacks, as this
approach can impede business productivity and negatively impact the user experience. It isn’t always easy to determine which
sites pose a threat and which do not. A fundamentally different approach to reducing browser risk is needed to give users the
unobstructed ability to browse and give you the confidence that your users are protected.
Zscaler Cloud Browser Isolation creates an isolated browsing session that enables users to access any webpage on the internet
without having to download any of the web content served by the webpage onto the local device or the corporate network. With
Zscaler Cloud Browser Isolation, users are not directly accessing active web content; instead, only a safe rendering of pixels is
delivered to the user so malicious code that may be hidden is kept at bay. And since Cloud Browser Isolation is a 100-percent
cloud-delivered service, you have no hardware or endpoint agents to deploy or manage.
Simply route internet-bound traffic for your high-risk employees to Zscaler Cloud Browser Isolation and it immediately enables
safe access to active content for your users—establishing isolated sessions for questionable websites to minimize the browser
attack surface and protect your sensitive data and users from web-based malware and data exfiltration.
Best of all, integration with Zscaler Internet Access™ (ZIA™) elevates security by applying an even higher level of protection
across all traffic, irrespective of whether it originates in the native browser or browser isolation platform. All traffic is inspected
by Zscaler Internet Access and defined corporate policies are applied, including data loss prevention and file-type policies.
Combined, Zscaler Internet Access and Zscaler Cloud Browser Isolation take your security to the highest level.
1
It’s Time to Isolate Your Services From the Internet Cesspool, Gartner, September 2016
DATA SHEET
• Protects executives and users who handle sensitive data from phishing attacks, ransomware, and other advanced threats.
• Provides safe access to uncategorized URLs, newly registered domains, and other active web content without having to
download the actual files.
• Stops zero-day attacks and other web-based threats from ever accessing endpoint devices or the network.
• Prevents users from activating targeted data theft attacks hidden in webpages, downloadable web content,
and browser plug-ins.
• Eliminates the threat of data exfiltration from phishing and spear-phishing attacks.
• Prevents outdated and vulnerable browsers, or even questionable and unsafe plug-ins, from being leveraged to compromise
the user’s device or exfiltrate data.
• Secures all traffic, whether it originates in the native browser or in a Cloud Browser Isolation session.
• Delivers security as a cloud service to eliminate architectural changes and reduce operational cost and complexity.
• Provides a uniform framework for policy definition, enforcement, and authentication.
FEATURES
• Agentless solution—Provide secure access to web • Centralized granular policy management—Define all web security
content without physical hardware or an endpoint agent policies, including isolation policies, on a centralized granular
on every device. policy framework without having to replicate policies
on multiple platforms.
• Integrated with Zscaler Internet Access—All traffic
destined to the isolation environment and traffic from the • Data exfiltration controls—Define the level of interaction the user’s
isolation environment to the internet is governed by the local computer can have in the isolation environment, including
policies (URL, cloud app, DLP, etc.) defined in ZIA. upload/download control and clipboard sharing between isolation
and the local computer.
• Pixel streaming-based technology—Securely stream content
to the end user’s native browser as pixels over an HTML5 • Secure file rendering—Render PDF files, text files, and more in the
canvas to protect users from connecting to active content. isolation environment to protect against weaponized documents.
DATA SHEET
2 3
1 2 3 4
Provide safe access to Keep endpoint devices Stop theft of confidential Stop data leakage by
active content by protected from threats by business data with granular controlling the user's
containing it inside a confining downloaded policies that prevent file ability to copy and paste
Cloud Browser Isolation files to the isolation downloads. data.
session. container.
Web app
3
Active web content How it works
(HTML, CSS, Flash, JS, cookies, etc.)
User
About Zscaler
Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust
Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.
Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest inline cloud security platform.
Zscaler, Inc.
120 Holger Way
San Jose, CA 95134
+1 408.533.0288
www.zscaler.com
©2020 Zscaler, Inc. All rights reserved. Zscaler™, Zero Trust Exchange™, Zscaler Internet Access™, ZIA™, Zscaler Private Access™, and ZPA™ are
either (i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or other countries. Any
other trademarks are the properties of their respective owners. V.102120