Call a Specialist Today! 800-886-5369


Cisco Umbrella Remote Browser Isolation

Browse Risky Websites Safely — Without Blocking Access

Cisco Umbrella Remote Browser Isolation executes all web content in a secure cloud environment, sending only a safe visual stream to the user’s browser. Malware, exploits, and ransomware never reach the endpoint — even from the most dangerous corners of the internet.

An Air Gap Between the Web and Your Endpoints

Even with DNS filtering and web proxies in place, some web content cannot be categorized or blocked without disrupting legitimate business workflows. Remote Browser Isolation creates a virtual air gap by executing all web content in Cisco’s cloud infrastructure — only a pixel-rendered image stream reaches the user’s browser. No scripts, no plugins, no active content ever executes on the endpoint.

“Organizations that isolate internet web browsing will experience a 70% reduction in attacks that compromise end user systems.”

— Gartner, Innovation Insight for Remote Browser Isolation, 2018

How Remote Browser Isolation Works

RBI intercepts web requests for targeted sites and redirects them to a cloud-hosted browser. The remote browser fetches and renders all page content in isolation. The user sees and interacts with a real-time visual representation — with full functionality — but no web code ever runs on their device.

Cisco Umbrella Remote Browser Isolation architecture showing isolated cloud browsing session
  • Web content executes in a cloud-hosted container, not the user’s browser
  • Only an interactive visual stream is delivered to the endpoint
  • Each isolated session is discarded after use — no persistent state on the endpoint
  • Transparent to users — no browser extensions or client agents required
  • Applied selectively to risky or uncategorized sites without blocking access

Threats Eliminated by Remote Browser Isolation

Users spend 75% of the workday in a web browser, making it the largest attack surface in most organizations. RBI is designed for situations where blocking a website entirely is not acceptable but allowing unrestricted access creates unacceptable risk. These are the threats it specifically addresses.

Drive-By Malware

Malicious code embedded in web pages or advertising networks cannot execute on the endpoint. The isolated container absorbs the attack and is discarded after the session ends.

Zero-Day Exploits

Unknown exploits targeting browser vulnerabilities have no path to the endpoint when browsing happens in an isolated cloud environment. Zero-day threats are contained in the remote container.

Compromised Websites

Legitimate websites that have been compromised by attackers can serve malware without warning. RBI protects users even on trusted sites that have been temporarily infected or hijacked.

Web-Based Exploits

Attacks that use JavaScript, Flash, or other active web technologies to exploit browser engines or plugins are stopped cold when those technologies execute only inside the isolated cloud container.

Cryptomining Scripts

Browser-based cryptomining scripts hijack CPU resources to mine cryptocurrency without user consent. RBI ensures these scripts execute only inside the isolated container, never consuming endpoint resources.

Fileless Attacks

Fileless malware exploits browser processes and scripting engines to execute entirely in memory, evading traditional file-based detection. RBI contains all script execution in the cloud, blocking fileless attacks at the source.

Targeted Protection

Built for High-Risk Users and High-Risk Destinations

RBI is not designed to isolate all browsing — that would create unnecessary overhead for routine activity. Instead, it applies selectively to the scenarios where the risk of compromise is highest and the cost of blocking is unacceptable.

  • High-risk users: Executives, finance teams, and privileged account holders who are frequent phishing and spear-phishing targets
  • Uncategorized sites: Newly registered domains and unclassified URLs where reputation data is unavailable
  • Risky categories: Legal-but-risky content categories such as personal file sharing, gambling, or hacking forums
  • Third-party research: Security analysts and threat intelligence teams who need to visit potentially malicious sites
Cisco Umbrella Remote Browser Isolation use cases for high-risk users

Integrated Into Umbrella — No Additional Infrastructure

Cisco Umbrella RBI is built into the Umbrella platform. Organizations already using Umbrella’s SWG can enable remote browser isolation for specific URL categories or user groups without deploying additional appliances or proxies. Policy configuration is managed through the existing Umbrella console.

Enable Per Policy

Apply RBI selectively using Umbrella’s policy engine — trigger isolation based on URL category, domain reputation score, user group, or a combination of conditions.

Transparent to Users

Users continue to browse normally. There is no visible indication that a session is isolated unless you configure a visual indicator — reducing friction and help desk calls. Works with all devices, browsers, and operating systems — no plugins or extensions required.

Controlled File Downloads

Configure whether users can download files from isolated sessions. You can allow downloads with automatic malware scanning, require read-only access, or block downloads entirely for specific site categories.

The Next Evolution

Cisco Umbrella Is Evolving to Cisco Secure Access

Building on Cisco Umbrella’s proven security with more than 30,000 customers globally, Cisco Secure Access delivers an intuitive user experience, simplified IT management, and powerful new capabilities — for the same price.

Explore Cisco Secure Access

Related Solutions

Remote browser isolation works best as part of a layered web security strategy.

Cisco Secure Access

Cloud-delivered SSE platform with ZTNA, SWG, CASB, and DLP for securing hybrid workforces from a single console.

Cisco Duo

Multi-factor authentication and device trust that verifies user identity before granting access to applications and data.

Cisco Secure Endpoint

Advanced endpoint protection that detects, prevents, and responds to threats across laptops, desktops, and mobile devices.

Protect High-Risk Users Without Blocking Their Work

Our Cisco-certified team will help you deploy Umbrella Remote Browser Isolation, configure policies for your highest-risk user groups and URL categories, and integrate RBI with your existing Umbrella deployment.

  • Zero web exploits reach the endpoint — ever
  • Transparent user experience with no browser extensions required
  • Selective policy application for high-risk users and uncategorized sites
  • Response from a certified Cisco specialist within one business day