When a user attempts to access potentially risky web content, the request is inspected against defined security policies. If the request triggers a policy match, the platform automatically creates an isolated browsing session segregated from the corporate network and endpoints.
It retrieves and renders the requested web content within this secure, cloud-based isolation environment. Only a stream of pixels representing the safe rendering is transmitted over an encrypted HTML5 channel to the user’s local browser for viewing – preventing any web code execution or content transfer to the endpoint.