<s>
Browser	B-Architecture
isolation	I-Architecture
is	O
a	O
cybersecurity	O
model	O
which	O
aims	O
to	O
physically	O
isolate	O
an	O
internet	O
user	O
's	O
browsing	O
activity	O
(	O
and	O
the	O
associated	O
cyber	O
risks	O
)	O
away	O
from	O
their	O
local	O
networks	O
and	O
infrastructure	O
.	O
</s>
<s>
Browser	B-Architecture
isolation	I-Architecture
technologies	O
approach	O
this	O
model	O
in	O
different	O
ways	O
,	O
but	O
they	O
all	O
seek	O
to	O
achieve	O
the	O
same	O
goal	O
,	O
effective	O
isolation	O
of	O
the	O
web	B-Application
browser	I-Application
and	O
a	O
user	O
's	O
browsing	O
activity	O
as	O
a	O
method	O
of	O
securing	B-Protocol
web	B-Application
browsers	I-Application
from	O
browser-based	O
security	O
exploits	O
,	O
as	O
well	O
as	O
web-borne	O
threats	O
such	O
as	O
ransomware	O
and	O
other	O
malware	O
.	O
</s>
<s>
When	O
a	O
browser	B-Architecture
isolation	I-Architecture
technology	O
is	O
delivered	O
to	O
its	O
customers	O
as	O
a	O
cloud	B-Architecture
hosted	O
service	O
,	O
this	O
is	O
known	O
as	O
remote	B-Architecture
browser	I-Architecture
isolation	I-Architecture
(	O
RBI	O
)	O
,	O
a	O
model	O
which	O
enables	O
organizations	O
to	O
deploy	O
a	O
browser	B-Architecture
isolation	I-Architecture
solution	O
to	O
their	O
users	O
without	O
managing	O
the	O
associated	O
server	O
infrastructure	O
.	O
</s>
<s>
There	O
are	O
also	O
client	O
side	O
approaches	O
to	O
browser	B-Architecture
isolation	I-Architecture
,	O
based	O
on	O
client-side	O
hypervisors	O
,	O
which	O
do	O
not	O
depend	O
on	O
servers	O
in	O
order	O
to	O
isolate	O
their	O
users	O
browsing	O
activity	O
and	O
the	O
associated	O
risks	O
,	O
instead	O
the	O
activity	O
is	O
virtually	O
isolated	O
on	O
the	O
local	O
host	O
machine	O
.	O
</s>
<s>
Client-side	O
solutions	O
break	O
the	O
security	O
through	O
physical	O
isolation	O
model	O
,	O
but	O
they	O
do	O
allow	O
the	O
user	O
to	O
avoid	O
the	O
server	O
overhead	O
costs	O
associated	O
with	O
remote	B-Architecture
browser	I-Architecture
isolation	I-Architecture
solutions	O
.	O
</s>
<s>
Browser	B-Architecture
isolation	I-Architecture
typically	O
leverages	O
virtualization	B-General_Concept
or	O
containerization	O
technology	O
to	O
isolate	O
the	O
users	O
web	O
browsing	O
activity	O
away	O
from	O
the	O
endpoint	O
device	O
-	O
significantly	O
reducing	O
the	O
attack	O
surface	O
for	O
rogue	O
links	O
and	O
files	O
.	O
</s>
<s>
Browser	B-Architecture
isolation	I-Architecture
is	O
a	O
way	O
to	O
isolate	O
web	O
browsing	O
hosts	O
and	O
other	O
high-risk	O
behaviors	O
away	O
from	O
mission-critical	O
data	O
and	O
infrastructure	O
.	O
</s>
<s>
Browser	B-Architecture
isolation	I-Architecture
is	O
a	O
process	O
to	O
physically	O
isolate	O
a	O
user	O
's	O
browsing	O
activity	O
away	O
from	O
local	O
networks	O
and	O
infrastructure	O
,	O
isolating	O
malware	O
and	O
browser	B-Application
based	O
cyber-attacks	O
in	O
the	O
process	O
while	O
still	O
granting	O
full	O
access	O
.	O
</s>
<s>
In	O
2017	O
,	O
the	O
American	O
research	O
group	O
Gartner	O
identified	O
remote	B-Architecture
browser	I-Architecture
(	O
browser	B-Architecture
isolation	I-Architecture
)	O
as	O
one	O
of	O
the	O
top	O
technologies	O
for	O
security	O
.	O
</s>
<s>
According	O
to	O
Market	O
Research	O
Media	O
,	O
the	O
remote	B-Architecture
browser	I-Architecture
isolation	I-Architecture
(	O
RBI	O
)	O
market	O
is	O
forecast	O
to	O
reach	O
$10	O
Billion	O
by	O
2024	O
,	O
growing	O
at	O
CAGR	O
30%	O
in	O
the	O
period	O
2019	O
–	O
2024	O
.	O
</s>
<s>
Unlike	O
traditional	O
web	O
security	O
approaches	O
such	O
as	O
antivirus	B-Application
software	I-Application
and	O
secure	B-Protocol
web	I-Protocol
gateways	I-Protocol
,	O
browser	B-Architecture
isolation	I-Architecture
is	O
a	O
zero	O
trust	O
approach	O
which	O
does	O
not	O
rely	O
on	O
filtering	B-Protocol
content	O
based	O
on	O
known	O
threat	O
patterns	O
or	O
signatures	O
.	O
</s>
<s>
Rather	O
,	O
browser	B-Architecture
isolation	I-Architecture
approach	O
treats	O
all	O
websites	O
and	O
other	O
web	O
content	O
that	O
has	O
not	O
been	O
explicitly	O
whitelisted	O
as	O
untrusted	O
,	O
and	O
isolates	O
them	O
from	O
the	O
local	O
device	O
in	O
a	O
virtual	B-Architecture
environment	I-Architecture
such	O
as	O
a	O
container	B-Application
or	O
virtual	B-Architecture
machine	I-Architecture
.	O
</s>
<s>
Web-based	O
files	O
can	O
be	O
rendered	O
remotely	O
so	O
that	O
end	O
users	O
can	O
access	O
them	O
within	O
the	O
browser	B-Application
,	O
without	O
downloading	O
them	O
.	O
</s>
<s>
Alternatively	O
,	O
files	O
can	O
be	O
sanitized	O
within	O
the	O
virtual	B-Architecture
environment	I-Architecture
,	O
using	O
file	O
cleansing	O
technologies	O
such	O
as	O
Content	B-General_Concept
Disarm	I-General_Concept
&	I-General_Concept
Reconstruction	I-General_Concept
(	O
CDR	O
)	O
,	O
allowing	O
for	O
secure	O
file	O
downloads	O
to	O
the	O
user	O
device	O
.	O
</s>
<s>
Typically	O
browser	B-Architecture
isolation	I-Architecture
solutions	O
provide	O
their	O
users	O
with	O
'	O
disposable	O
 '	O
(	O
non-persistent	O
)	O
browser	B-Application
environments	O
,	O
once	O
the	O
browsing	O
session	O
is	O
closed	O
or	O
times	O
out	O
,	O
the	O
entire	O
browser	B-Application
environment	O
is	O
reset	O
to	O
a	O
known	O
good	O
state	O
or	O
simply	O
discarded	O
.	O
</s>
<s>
In	O
this	O
way	O
,	O
browser	B-Architecture
isolation	I-Architecture
proactively	O
combats	O
both	O
known	O
,	O
unknown	O
and	O
zero-day	O
threats	O
,	O
effectively	O
complementing	O
other	O
security	O
measures	O
and	O
contributing	O
to	O
a	O
defense-in-depth	O
,	O
layered	O
approach	O
to	O
web	O
security	O
.	O
</s>
<s>
Browser	B-Architecture
isolation	I-Architecture
began	O
as	O
an	O
evolution	O
of	O
the	O
'	O
security	O
through	O
physical	O
isolation	O
 '	O
cybersecurity	O
model	O
and	O
is	O
also	O
known	O
as	O
the	O
air-gap	B-Architecture
model	O
by	O
security	O
professionals	O
,	O
who	O
have	O
been	O
physically	O
isolating	O
critical	O
networks	O
,	O
users	O
and	O
infrastructures	O
for	O
cybersecurity	O
purposes	O
for	O
decades	O
.	O
</s>
<s>
The	O
use	O
of	O
an	O
air-gap	B-Architecture
makes	O
infiltration	O
into	O
systems	O
from	O
the	O
public	O
internet	O
extremely	O
difficult	O
,	O
if	O
not	O
impossible	O
without	O
physical	O
access	O
to	O
the	O
system	O
.	O
</s>
<s>
The	O
first	O
commercial	O
browser	B-Architecture
isolation	I-Architecture
platforms	O
were	O
leveraged	O
by	O
the	O
National	O
Nuclear	O
Security	O
Administration	O
at	O
Lawrence	O
Livermore	O
National	O
Laboratory	O
,	O
Los	O
Alamos	O
National	O
Laboratory	O
and	O
Sandia	O
National	O
Laboratories	O
in	O
2009	O
,	O
when	O
browser	B-Architecture
isolation	I-Architecture
platforms	O
based	O
on	O
virtualization	B-General_Concept
were	O
used	O
to	O
deliver	O
non-persistent	O
virtual	O
desktops	O
to	O
thousands	O
of	O
federal	O
government	O
users	O
.	O
</s>
<s>
In	O
June	O
2018	O
,	O
the	O
Defense	O
Information	O
Systems	O
Agency	O
(	O
DISA	O
)	O
announced	O
a	O
request	O
for	O
information	O
for	O
a	O
"	O
cloud-based	B-Architecture
internet	O
isolation	O
"	O
solution	O
as	O
part	O
of	O
its	O
endpoint	O
security	O
portfolio	O
.	O
</s>
<s>
At	O
the	O
time	O
,	O
the	O
RFI	O
was	O
the	O
largest	O
known	O
project	O
for	O
browser	B-Architecture
isolation	I-Architecture
,	O
seeking	O
"	O
a	O
cloud	B-Architecture
based	O
service	O
leveraging	O
concurrent	O
(	O
simultaneous	O
)	O
use	O
licenses	O
at	O
~	O
60%	O
of	O
the	O
total	O
user	O
base	O
(	O
3.1	O
Million	O
users	O
)	O
.	O
"	O
</s>
