Remote Browser Isolation (RBI)

Remote Browser Isolation balances security and user productivity by allowing access to unknown websites in a safe, isolated environment. With an instant-on RBI, administrators can greatly reduce tickets requesting access to blocked sites, and users enjoy uninterrupted productivity with a secure, streamlined experience.

Remote Browser Isolation Configuration RBI Session RBI Configuration - URL Simulator

RBI Capabilities

Instant Deployment with Cloud-delivered Safe Browsing

Cato RBI can be quickly enabled in just a few clicks for all locations and users, without any additional hardware or software to deploy. Access to websites that are uncategorized will automatically be isolated in a remote session, streaming graphical representation of the web content to the user’s browser.

Remote Browser Isolation Configuration

Reduce the Risk of Web-based Attacks

Web browsing poses a significant risk since code is executed locally on the user’s device, potentially allowing the delivery of malware, credential theft, or other malicious activity. RBI isolates website code from the endpoint by rendering the site in a containerized environment that is destroyed completely at the end of the session. This process happens seamlessly and transparently to the user and prevents malicious code from reaching the device, allowing administrators an alternative to outright blocking uncategorized sites.

RBI Session

Manage and Control Risky Web Access Patterns

Admins need to understand internet access patterns and risk to track and monitor which sites are loaded with RBI, and which users use it most frequently. Cato enables admins to easily filter the unified event log, and track RBI events based on destination, user identity, volume, and other metrics. RBI policies can then be fine-tuned to match the enterprise specific needs. Using a dedicated tool in the Cato Management Applications, admins can manually load any site with RBI for further investigation and troubleshooting.

RBI Configuration - URL Simulator

Important Protection Against Phishing and Ransomware

Undefined and uncategorized sites are often used for phishing campaigns and ransomware delivery. Cato RBI automatically launches undefined and uncategorized sites in a completely isolated environment, preventing transfer of data and files to and from the user device. As a result, RBI eliminates such websites as a threat vector, providing organizations significantly stronger protection from phishing and ransomware with zero effort and no impact on user productivity.

Remote Browser Isolation Video Demo

Cato’s Remote Browser Isolation features instant-on activation with limited configuration requirements and secures uncategorized and undefined websites in a completely isolated session.

The Strategic Benefits of a True SASE Platform

Architected from the ground up as a true cloud-native SASE platform, all Cato’s security capabilities, today and in the future, leverage the global distribution, massive scalability, advanced resiliency, autonomous life cycle management, and consistent management model of the Cato platform.

Consistent Policy Enforcement

Cato extends all security capabilities globally to deliver consistent policy enforcement everywhere and to everyone, from the largest datacenters down to a single user device.

Scalable and Resilient Protection

Cato scales to inspect multi-gig traffic streams with full TLS decryption and across all security capabilities, and can automatically recover from service component failures to ensure continuous security protection.

Autonomous Life Cycle Management

Cato ensures the SASE cloud platform maintains optimal security posture, 99.999% service availability, and low-latency security processing for all users and locations, without any customer involvement.

Single Pane of Glass

Cato provides a single pane of glass to consistently manage all security and networking capabilities including configuration, analytics, troubleshooting, and incident detection and response. Unified management model eases new capabilities adoption by IT and the business.

“We ran a breach-and-attack simulator on Cato, Infection rates and lateral movement just dropped while detection rates soared. These were key factors in trusting Cato security.”

Try Cato

The Solution that IT teams have been waiting for.
Prepare to be amazed!