Products > Browser Isolation

Browser Isolation

Unmatched defense against web-based data leakage and threats, powered by the industry's most advanced zero trust web isolation.


of organizations have seen data breaches rise due to remote work


of attacks are carried out over the public internet


reduction in attacks compromising end-user systems is available with browser isolation

Web security’s next frontier

For modern enterprises, the internet has become the new corporate network. This enables remote users to access SaaS apps and private apps via the web, which expands the attack surface and exposes data. Simultaneously, the escalation of zero-day vulnerabilities, ransomware, drive-by downloads, and other sophisticated attacks increases the risk of infection and data theft from web-based threats.

Browser Isolation addresses the above challenges by reimagining web security. It safely isolates users and endpoints from all active web content, preventing the exfiltration of data and stripping attackers of their most advanced tools and techniques. Browser Isolation makes web-based attacks a distant memory and is a key component of proper data protection along with CASB.

Embrace the future of web security

Start your exclusive 30-day trial of Browser Isolation today.

“Many enterprises are now seeking more than just a proxy service in the cloud, as they add...remote browser isolation (RBI)...and other cloud-based security services.”

–Gartner, 2020 SWG MQ

The ultimate expression of zero trust for safe web access.

In today’s cloud- and mobile-first world, the internet is used as an untrusted transport to connect users and applications to resources across any location or device.
A fundamentally different approach to security, built around zero trust with Browser Isolation, creates a safe gap between users and the web, rendering content as a stream of picture-perfect images to eliminate the leakage of data and the delivery of active threats. Zscaler even accomplishes this without software agents on endpoints, perfect for securing access from unmanaged devices outside the enterprise’s purview.
Protect users, data, and applications with Browser Isolation: an integral part of your zero trust strategy.

More browsing, less worry

Browser Isolation provides a completely safe web experience:

  • Protect from internet threats: Defend against sensitive data theft and stop ransomware, zero-day vulnerabilities, and advanced attacks with an unbreakable air gap between users and destinations
  • An internet experience everyone loves: Get nearly invisible browser isolation with lightning-fast connection to apps and websites through our direct-to-cloud proxy architecture and unique pixel-streaming technology
  • Consistent protection for everyone, everywhere: Protect all users in any location with a browser isolation policy that spans headquarters, mobile and remote sites, and managed and unmanaged devices
  • Cutting edge security, less hassle: Deploy and manage in seconds with cloud agility as a natively integrated extension of the Zscaler Zero Trust Exchange platform
  • Powered by AI: Make your organization more secure and your users more productive in seconds with AI-generated URL isolation policies that are deployed instantly and customizable to meet your needs
More browsing, less worry

Use cases

Zero trust threat isolation
Zero trust threat isolation: Stop zero-day vulnerabilities, ransomware, drive-by downloads, malvertising, and other sophisticated attacks from reaching end users by isolating web traffic, creating an air gap in front of all active web content
Zero trust data isolation
Zero trust data isolation: Prevent data leakage or theft from web-based email, SaaS applications, and internal apps with granular policy control to prevent upload, download, copy, paste, and print actions
Zero trust data isolation
Zero trust app isolation: Without software installations on endpoints, secure access to SaaS and private apps for BYOD or third-party unmanaged devices that require access but are difficult to control and constitute risk
Zero trust key employee isolation
Zero trust key employee isolation: Easily set user group isolation policy based on user risk scores or job roles, protecting high-value targets like your C-level executives, finance, accounting, or HR teams

Separate the good from the bad

Browser Isolation uses ground-breaking pixel streaming technology to execute all web content within a completely safe isolation environment before serving up clean web pages, apps, and content to the user—defending against advanced threats and preventing sensitive data loss.

Get the same browsing experience users expect, while safely isolating them from malicious activity.

Separate the good from the bad

Protection on any browser. Anywhere.

Let your users enjoy their favorite browser—e.g. Chrome, Safari, Firefox, and Internet Explorer—with universal compatibility built in.

Extend protections everywhere with Zscaler Client Connector to isolate web traffic from HQ, branch, and remote users.

Leverage clientless browser isolation to secure access to corporate IT resources for unmanaged devices with questionable security postures.

Protection on any browser. Anywhere.

Natively integrated. Potent protection.

Browser Isolation is natively integrated with Zscaler’s Zero Trust Exchange, providing robust data loss and threat prevention for all web activity.

  • Consistent protection for all users, devices, and applications in any location
  • Unified and simplified management to streamline policy creation and day-to-day operations
  • Extend your existing Zscaler investments with natively integrated browser isolation technology
Natively integrated. Potent protection.

Backed by the world’s largest inline security cloud

Security policy and enforcement close to the user

The Zscaler Zero Trust Exchange processes over 200 billion transactions daily and elastically scales to your traffic demands. With more than 150 data centers globally, every user gets a fast, local connection no matter where they connect.
Backed by the world’s largest inline security cloud

“I’m a big fan of Browser Isolation. I want to deploy it everywhere.”

–John McLeod, CISO, NOV

Suggested Resources


Browser Isolation data sheet


Browser Isolation: Protecting Data and Apps


Browser Isolation: Stopping Web-Based Threats


Data Protection Features: Browser Isolation


Data Protection Dialogues: How to Secure Unmanaged Devices


How to Manage the “Gray List”