Fortinet’s Browser Isolation platform, FortiIsolator, provides a next level of Advanced Threat Protection (ATP) that integrates with Fortinet’s Security Fabric. It addresses the need to access shared links and web content for business purposes while maintaining the most robust internet hygiene. Specifically, FortiIsolator allows web content to be accessed without the risk of user compromise by maintaining an “air-gap” between the user’s browser and the web content.
Allow user access to potentially malicious content while maintaining strict security
Native integration methods allow the use of standard browsers to access potentially malicious web content without the risk of compromising the user’s desktop – preventing zero-day infections.
Broad Coverage of the Attack Surface with Security Fabric
Integrated with FortiGate and FortiMail for defense against advanced targeted attacks across network, application layers and endpoint devices.
Highlights
Problem
- Zero-day malware and phishing threats delivered over the web, in email and in downloaded PDF files may result in data loss, compromise or ransomware.
Solution
- With FortiIsolator, web content is executed in a remote disposable container and displayed to the user, isolating any threat.
Benefits
- Protects against known and unknown malware, ransomware and other zero-day threats.
- Allows users to access URLs while maintaining security and enhances productivity.
Product Summary
FortiIsolator is a clientless browser isolation solution which allows the user to access potentially malicious content using their regular browser without the risk of compromising their browser, desktop or mobile device. FortiIsolator is designed to work as unobtrusively as possible, interoperating with any modern HTML5 capable browser (ie: Edge, Chrome, Safari, Firefox), meaning no requirement for any client or plugin software on the end user device.
FortiIsolator prevents drive-by and watering hole attacks by accessing the potentially malicious content in a trusted execution container which is disposed of at the end of the browser session and presenting the user with a visual rendering of the web page. This rendered version of the web page can still be interacted with e.g. videos viewed, links clicked, and PDF files opened. However, the rendering process prevents any content from being able to cross over to the user’s system.
Critical threat vectors
Email is the most common attack vector for malware (92.4%) and social attacks such as phishing (96%) and the majority of that is delivered via web links. Steps can be taken to filter known malicious and unrated links, however, the latter may impact productivity. By combining FortiIsolator with your Secure Mail Gateway, Firewall, Secure Web Gateway or Desktop Client, you are able to allow users to access URLs while maintaining security — increasing productivity.