A Whitepaper on Browser Isolation Cybersecurity

A comprehensive white-paper covering the browser isolation concept, the different models (client/server side), the different technologies and their evolution over time.

Read More

Solving The Big Problems In Remote Browser Isolation

What are the big problems in remote browser isolation and how can we solve them? Our CEO, Guise Bule, talks us through the problems and proposes some viable solutions.

Read More

Difference Between Browser Isolation & Remote Browsing?

What is the difference between browser isolation and remote browsers (remote browsing)? Our CEO Guise Bule explains it in simple terms.

Read More

What Is Browser Isolation?

Browser isolation is the art of physically isolating your users browsing activity away from your local networks and infrastructure, in doing so you physically isolate malware and browser based cyber-attacks in the process.

Read More

What Is Remote Browsing?

Remote browsing is a method of browsing the internet using a browser that is hosted in the cloud, rather than installed locally on your PC or laptop and is an effective way of isolating yourself from malware.

Read More

How Does Remote Browser Isolation Protect You?

Remote browser isolation protects you from malware by putting an air-gap between you and the malware/ransomware that lies in wait for you on the public internet.

Read More

An Introduction To WEBGAP Browser Isolation Cybersecurity

Our mission is a simple one, we aim to isolate our users from malware and web based threats, allowing them to use the internet without worrying about cyberattacks.

Read More

How to Deliver Affordable Remote Browsing To Your Users

The curse of internet based threats like malware, APT's and ransomware are most affecting the groups less likely to have the resources to properly protect themselves.

Read More

A Cybersecurity Horror Story: The Browser Is Broken

We love browsers, they are our window to the world. We love browsers so much that we have fought wars over them, wars so fierce that only three browsers survived.

Read More

Rest-In-Peace Virtualization Based Cybersecurity

After what feels like a lifetime spent trying to make virtualization work for cybersecurity, it is with a heavy heart that I must pronounce virtualization based cybersecurity dead.

Read More

Cybersecurity Research: Verizon Data Breach Report

The tenth edition of the excellent Verizon Data Breach Investigations Report (2017), containing a wealth of information, analysis and current data on the cause of data breaches.

Read More

Cybersecurity Research: Ponemon Cost Of Data Breach Study

A great piece of research sponsored by IBM Security and independently conducted by Ponemon on the costs of data breaches, based on current data & research.

Read More