Introducing G2.ai, the future of software buying.Try now
Forcepoint Remote Browser Isolation
Save to My Lists
Unclaimed
Unclaimed

Forcepoint Remote Browser Isolation Reviews & Product Details

Forcepoint Remote Browser Isolation Overview

What is Forcepoint Remote Browser Isolation?

Forcepoint Remote Brower Isolation protects users by isolating web browsing sessions in a secure, remote environment. This prevents malware and web-borne threats from reaching devices while maintaining a seamless browsing experience.

Forcepoint Remote Browser Isolation Details
Show LessShow More
Product Description

Forcepoint Remote Brower Isolation protects users by isolating web browsing sessions in a secure, remote environment. This prevents malware and web-borne threats from reaching devices while maintaining a seamless browsing experience.


Seller

Forcepoint

Description

Forcepoint is a global cybersecurity leader focused on providing organizations with adaptive and intelligent solutions to safeguard users, data, and networks. The company specializes in understanding people’s behaviors and motivations as they interact with critical data and intellectual property wherever it resides. Forcepoint's offerings span from cloud and network security to advanced threat protection, using a unified cloud-centric platform to reduce cost and complexity while creating secure environments for business growth. Its products are designed for a wide array of sectors including government, finance, and enterprise environments, aiming to drive digital transformation and support compliance efforts.

Forcepoint Remote Browser Isolation Media

Answer a few questions to help the Forcepoint Remote Browser Isolation community
Have you used Forcepoint Remote Browser Isolation before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Forcepoint Remote Browser Isolation for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(306)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
2
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(125)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
3
Authentic8 Silo for Research Logo
Authentic8 Silo for Research
4.7
(103)
The Silo Web Isolation Platform — a secure, cloud-native execution environment for all web-based activity — underpins two core products: Silo for Safe Access and Silo for Research. Silo for Safe Access is an isolated workspace that allows IT to manage use of the web regardless of the access details or the role of the user. The end user receives a familiar browsing environment via benign video display. Silo for Research leverages the same browsing experience, IT control and security but adds a powerhouse of capabilities and automated features purpose-built for online investigators. The solution gives them the control to manage how their digital fingerprint appears to visited websites during the course of investigations — whether they be for law enforcement, trust and safety, cybersecurity intelligence or other purposes. This way, investigators can blend in with the crowd and not give away their identity of intent to investigative targets, which could cause them to disinform, go into hiding or retaliate against the investigator or their organization.
4
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(94)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
5
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(59)
Citrix Secure Browser is service protects the corporate network from browser-based attacks by isolating web browsing. It delivers consistent, secure remote access to internet hosted web applications with zero end-point configuration.
6
Kasm Workspaces Logo
Kasm Workspaces
4.7
(47)
Workspaces is a modern, secure and cost-effective solution for remote browser isolation (RBI), containerized application streaming (CAS), virtualized desktop infrastructure (VDI) and desktop as a service (DaaS) that provides a remote desktop and remote work solution for your distributed workforce. The Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
7
iboss Logo
iboss
4.0
(15)
Replace VPN, SWG, SD-WAN, Firewall, CASB, and Browser Isolation with a Consolidated SaaS Network & Security Service.
8
Seraphic Web Security Logo
Seraphic Web Security
4.9
(13)
Seraphic can secure any version of any browser on any device to prevent phishing, spear-phishing, clickjacking, CSS injection, man-in-the-middle, and Zero-day and unpatched N-Day attacks that other vendors cannot. This means that your end-users can leverage any combination of browsers they prefer and you can centrally manage corporate policy and governance for browsing as well as enterprise/private apps and SaaS environments. Seraphic also includes robust policy and governance controls including state of the art DLP engines that scans all outbound and inbound data in any format for any file with a complete privacy first approach.
9
ManageEngine Browser Security Plus Logo
ManageEngine Browser Security Plus
4.4
(8)
Browser Security Plus is an enterprise browser management tool that helps IT administrators manage and secure browsers across networks. It enables them to enforce security policies, control browser extensions and plug-ins, sandbox and lockdown enterprise browsers and also ensure compliance with stipulated browser configurations to protect their networks from browser-based threats.
10
Phantom Logo
Phantom
4.7
(5)
Show More