Remote browser isolation

Remote Browser Isolation was built to protect users from web-based threats by moving risky browsing activity into a separated environment.

Instead of allowing content to run locally, RBI renders pages in the cloud and streams them back to the user.

That can work for isolating known risk. It doesn’t when an attack looks like normal browsing activity.

Button
Trusted by:

Isolation isn’t coverage

RBI only activates when something is flagged as risky. In practice, that means most browsing isn’t isolated at all. Policies decide when to trigger isolation based on URL reputation, categorization, or risk scoring. Everything else runs as normal.That creates a gap.

Push takes a different approach. It operates inside every browser session, giving security teams continuous visibility and real-time detection without relying on isolation triggers or introducing latency.

Dimension Push Security RBI
Security approach
Detects and responds to attacker behavior in real time
Isolates sessions based on policy triggers
What it's designed to stop
Phishing, session hijacking, and credential abuse
Malware and known high-risk web content
Visibility into real activity
Sees how users authenticate, access apps, and interact in any browser
No visibility into actions inside isolated sessions
Coverage across browsing
Continuous visibility across all browser sessions
Limited to a small subset of traffic
Modern attack detection
Detects browser-based attacks in real time
Focused on containment, not attacker behavior
User experience
Native browsing with no added friction
Latency and degraded UX in isolated sessions
Time to security value
Immediate visibility and detection after deployment
Dependent on policy tuning and selective use
Push Security
RBI
Security approach
Detects and responds to attacker behavior in real time
Isolates sessions based on policy triggers
What it's designed to stop
Phishing, session hijacking, and credential abuse
Malware and known high-risk web content
Visibility into real activity
Sees how users authenticate, access apps, and interact in any browser
No visibility into actions inside isolated sessions
Coverage across browsing
Continuous visibility across all browser sessions
Limited to a small subset of traffic
Modern attack detection
Detects browser-based attacks in real time
Focused on containment, not attacker behavior
User experience
Native browsing with no added friction
Latency and degraded UX in isolated sessions
Time to security value
Immediate visibility and detection after deployment
Dependent on policy tuning and selective use