Hysolate Browser

Why do I need another browser?

In today’s cyber threat landscape, the built-in security capabilities of modern browsers are just not enough to stop malware or malicious insiders from doing harm. Furthermore, human error can lead to data leaks and breaches.

As an example, attackers find numerous critical vulnerabilities in Chrome every year, and can leverage these vulnerabilities to craft malicious websites/files – and when this malicious content is rendered by the browser, the attacker can take over the endpoint and use it to breach an organization, leak data, or deploy ransomware.

Furthermore, employees or contractors can by mistake or intentionally leak enterprise data accessed via Chrome. The problem becomes even worse as organizations allow 3rd parties and employees to use unmanaged and potentially infected endpoints to access enterprise apps via their browser.

Introducing Hysolate Browser

Hysolate Browser is a Chromium-based browser running within a local isolated virtual machine. It provides strong bi-directional separation between the endpoint OS and the Hysolate Browser, allowing users to safely access content, be it enterprise apps containing sensitive data or risky/malicious content on the wild web. It is instantly deployed, provides a familiar local experience to users, and includes multiple built-in security controls beyond VM isolation.

A Familiar User Experience

Behind the scenes, Hysolate Browser runs the standard Chromium browser. This lets users feel right at home when using the Hysolate Browser – there’s no learning curve or training. Furthermore, as opposed to Remote Browser Isolation technologies (RBI) or VDI/DaaS, the Hysolate Browser runs locally and does not require a high bandwidth/low latency network connectivity for a great user experience. The browser leverages the user’s existing hardware, eliminating the need for the high data center/cloud costs that are typically associated with VDI/DaaS/RBI.

Advanced Security Controls

As the Hysolate Browser runs in a virtual machine, browser vulnerabilities are no longer a concern. If the Chromium browser has a vulnerability and the user browses to a malicious website/file, the attack will be contained within the VM and will not spread out to the rest of the endpoint. The VM can also be reset to a clean snapshot on demand. Hysolate Browser also secures itself from the host operating system: if a 3rd party/employee uses an unmanaged endpoint to access enterprise resources, the Hysolate Browser prevents them from leaking data out of the browser, including screenshot protection, VM disk encryption, clipboard protection, etc.

Instantly Deployed

The Hysolate Browser doesn’t require you to prepare any virtual machine image. The product includes everything you need out-of-the-box and is installed just like any other app, including the underlying guest OS that will be running the Hysolate Browser. For example, on Windows, the Hysolate Browser leverages the latest innovations in Hyper-V to automatically create a VM out of the existing trusted Windows files that exist on the host OS – eliminating any overhead previously associated with creating or updating the guest OS.

Minimal Requirements

Hysolate Browser requires 8GB of RAM, an Intel/M1 CPU from the last 5 years, and an SSD disk. It runs on Windows 10/11 Pro/Enterprise or macOS Big Sur 11.0 or later. For the best user experience, 16GB of RAM is recommended.

Read More