Iboss protects web sessions with remote browser isolation

Platform enhancements protect users and sensitive data

Man in suit pressing padlocks in the shape of a cloud

Cloud security company iboss has launched three new features to its software-as-a-service (SaaS)-based network security platform, including a new remote browser isolation capability that protects native browsers on high-risk sites. 

The remote browser isolation feature activates when users access sites the iboss security platform categorizes as high risk. The feature isolates web traffic between the user and that site using a remote session outside the user's native web browser

The company said the remote browser isolation feature could secure access to sensitive data in services like Box, Dropbox, and Salesforce from unmanaged endpoints. It also lets users view files without downloading them. 

iboss has extended its cloud access security broker (CASB) functionality with an application programming interface (API) that lets the service examine files stored in major cloud services. 

This file-examination feature, which currently integrates with Box, Google, and Microsoft 365, generates a list of the files stored in each cloud service to give administrators a clear picture of what data users store on third-party cloud services. It also allows them to test the files for malware and ensure they comply with the platform's data loss prevention (DLP) settings, flagging the file and the user who stored it if there's a problem. 

The third addition is a set of additional controls over cloud applications, including Azure, AWS EC2, and GitHub. Administrators can configure triggers to instigate events based on user actions, including blocking access to forbidden sites and applications. This product's CASB controls cover Google applications, including YouTube and Google Drive, and administrators can apply them on a per-user or per-group basis. 

The iboss cloud platform secures user connections to cloud services, enabling them to connect directly via a cloud-based gateway rather than tunneling back to company headquarters via a VPN.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
It’s time to bring Spotify Wrapped to the workplace
Data & insights

It’s time to bring Spotify Wrapped to the workplace

14 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022