Ericom Shield

Browser Isolation

that shields your endpoint

Cybercrime shows no signs of slowing. Are you Shielded?


Ericom Shield adds a powerful layer to your defense-in-depth strategy by isolating malware, ransomware and other threats where they can’t harm your network and user devices. Empower end users with full, transparent Internet use, including file downloads, while reducing risk, costs and operational burden on your IT staff.

Ericom shield is Remote Browser Isolation that executes each website in an isolated browser located in a disposable Linux container, remote from organizational networks. Rendered as a safe content stream and delivered to endpoint browsers, it provides a native, interactive and seamless browsing experience. Because active website content never reaches your endpoints, networks are protected even from
zero-day threats.

Ericom Shield Remote Browser Isolation augments existing defenses to keep malware and zero-day exploits off endpoints and networks

Browsing with Confidence

Browsing with Confidence

Empowers users with the confidence to click without fear of data exploits ransomware, phishing, adware and other threats

End users can consume content freely without limiting their productivity

Cleanses downloaded files with factory-integrated sanitization

Reduces IT complexity, costs and management associated with blocking malware at the end-user device

Scales up quickly with no requirement for endpoint installations or plug-ins

Eliminates endpoint compatibility concerns

Operational Excellence

Operational Excellence

What is browser isolation?

What is browser isolation?

Executes 100% of active web content off of endpoint, in a remote disposable container

Renders websites as a safe interactive content stream

Delivers transparent, natural browsing experience for users


Ericom Shield sends 100% of your malware-laden web traffic on a detour


No Screenshots available


Airgap Endpoints from Web-Based Attacks

Ericom Shield handles browsing sessions remotely, blocking web-borne threats from penetrating the network.