An Introduction To The WEBGAP Browser Isolation Platform
We estimate that 98% of external information security attacks are carried over the public internet, and that 80% of these attacks are targeted directly at end user browsers using web traffic or malicious URLs.Gartner
Our mission is a simple one, we aim to isolate our users from malware and web based threats, allowing them to use the internet without worrying about cyberattacks. We do this in a simple way, by physically isolating your internet activity away from your local machine, in doing so we also physically isolate any of the associated risks that come with using the internet.
WEBGAP is the developer of the WEBGAP platform, a proprietary remote browsing platform designed to effectively isolate your users from malware in a secure, cost effective and highly scalable way. The WEBGAP platform was built on the principles of the WEBGAP model, a physical isolation cybersecurity model that we first developed in collaboration with National Nuclear Security Administration cybersecurity teams. We were proud to be the first team on the planet to host a large scale remote browsing platform, for thousands of federal government users in high security environments.
We realized earlier than most that virtualization is an inefficient vehicle for handling browsing compute loads and our move away from virtualization and towards containerization means that we need roughly 10x less server infrastructure than our competitors solutions. We also realize that isolation is not enough and so we go a step beyond isolation to first destroy and then rebuild every web page, before delivering it to the user, providing them with a cleaner and purer internet.
The WEBGAP platform allows you to quickly set up and begin protecting your internet users from cyberattack, enabling them to ‘remote browse’ through our secure WEBGAP cloud servers and isolating the associated risks away from your networks. We offer the most scalable and cost effective browser isolation platform on the market and we believe that our model and architecture sets us above our competition in ten key ways:
1. No Client Software Required
There is no client side software or plugin required, WEBGAP users can simply browse safely after authenticating in a tab. If you have a large amount of users, enterprises can shield all of their users by configuring local browsers to push traffic through the WEBGAP proxy via an Active Directory policy. Easy to set up and deploy.
2. Securely Browse The Internet
Our users can can browse any websites including those that cannot be categorized by secure web gateways without worrying about being attacked by ransomware, phishing sites, XSS attacks, cookie stealing and drive-by download attacks, allowing them to use the internet in a worry free way, helping you to keep your networks free of malware.
3. Securely Read Emails
4. Total Malware Isolation
We completely and utterly physically isolate your users from malware, all active contents and scripts are executed on the WEBGAP isolation platform, the original webpages never leave our servers and no attacks are ever leaked outside the isolated WEBGAP environment, providing WEBGAP isolation peace of mind.
5. Browsing Policy & History
Using our administrative control panel, administrators can easily set up a URL whitelist and/or blacklist policies, all browsing history can also be logged for subsequent security auditing and we can easily integrate into existing user management systems. Its easy to manage your users internet browsing activity with WEBGAP.
6. Multiple Isolation Mechanisms
We isolate effectively at multiple levels to ensure that our users are kept safe from browser based cyber threats. The WEBGAP browser isolation platform employs rendering isolation, session isolation, process isolation and connection isolation to provide the worlds most secure and physically isolated remote browsing environment.
7. Website Pre-Rendering
We realized a long time ago that physical isolation is not enough, so we go a step further by destroying and then rebuilding every web page, stripping it of potentially malicious code before displaying it to the user. Our isolation engine pre-renders web pages and re-encodes them, rendering the results according to content type, before then restoring the full website experience for delivery to the end user. We provide or users with a safer internet, one free of malicious code
8. Container Clustering
The WEBGAP Engine is built upon a highly scalable and efficient containerization based architecture, our compute cluster is based on the containerization model and our isolation engine is packaged and executed as a container, meaning that it’s cost-effective to deploy and operate a WEBGAP platform on commodity server hardware.
9. Grid Distribution/Parallelization
The WEBGAP Engine leverages a unique grid distributed infrastructure that does not require any SAN or specialized appliance hardware. Because of our architecture, it is easy and cost effective to stretch cluster additional virtual, cloud and physical servers into the WEBGAP grid to expand capacity. Scale out, not up!
10. API Friendly
We built the WEBGAP Engine from the ground up to be API friendly, meaning that it is designed to integrate easily with your existing systems and security tools. Our API rich environment makes it easy for you to tool our service to suit your needs and pull out the data you need, for monitoring and management purposes.
It is these ten points above all that set us apart from our competition and they reflect the notion that we have been isolating users from malware longer than most. We provide a fully hosted and fully managed remote browsing solutions hosted out of our EMP proof, ex-government communications bunker, meaning that even if your adversaries launch an nuclear strike on our datacenter facility, we will still keep on delivering services as expected, adhering to our four 9's SLA.
If you are still letting your internet users browse the internet directly from their local machines, then we need to have a serious conversation about enhancing your cybersecurity posture. Let us help you achieve internet peace of mind.
EDITORIAL NOTE: What’s that? You like the things we write? Follow @WEB_GAP on Twitter for more!