透過零信任瀏覽保護團隊

Cloudflare 瀏覽器隔離服務使企業的網頁瀏覽變得更安全、更快捷,並且與原生瀏覽器相容。

網頁瀏覽器變得比以往任何時候都更加複雜。瀏覽器也是您的最大攻擊面之一。

Cloudflare 瀏覽器隔離是一種零信任瀏覽服務。該服務在遠離貴公司網路和端點的雲端運行,使設備免受攻擊。

Key benefits

想要保護員工免受網際網路威脅的侵害,為何如此困難?

Applying Zero Trust to browsing means that no code or interactions should be trusted to run on devices by default. Cloudflare Browser Isolation runs all code at our edge — insulating users from untrusted web content and protecting data in browser interactions from untrusted users and devices.

Reduce attack surface

Zero Trust browsing stops malicious code on uncategorized, risky, or even low-risk sites from infecting users’ devices

Simplify deployment

Set remote browser isolation policies from the same management dashboard where you manage application access, DNS/HTTP filtering, and more.

Protect data

Stop data loss and phishing by controlling user actions (keyboard input, copy, print, up/download) within apps or risky sites.


Customer value

Minimize your attack surface

Isolate without compromising user experience

Filters and inspections will never catch 100% of threats, even with the best intel. Isolate browsing instead of applying overly restrictive blocking policies.

Our Browser Isolation runs a headless version of the Chromium browser, which renders all browser code at our edge, instead of on your endpoints, to mitigate known and unknown threats like malware, ransomware and zero-day threats. The low-latency experience is invisible to end users and feels like a local browser.


Seamless user experience

不再使用您的普通遠端瀏覽器。

No pixel pushing. No latency

傳統的遠端瀏覽器會向使用者傳送緩慢且笨拙的網頁版本。而 Cloudflare 在使用者裝置上繪製精確的頁面複本,然後迅速無比地傳遞該複本,一如普通瀏覽器那樣。

Try it for yourself

Want to experience RBI in action?


Cloudflare Zero Trust

Natively-integrated RBI

Extend Zero Trust with built-in, not bolt-on security

Unlike other providers, Cloudflare has natively-integrated browser isolation with all our Zero Trust services.

Our browser isolation is built from the ground up with our other Zero Trust services on our network and designed to run across our 275+ locations.

Use a single management interface for:


Use Cases
Ransomware

Isolation effectively protects against ransomware infection. But even for non-isolated sites, that defense is bolstered by native integrations with services like our SWG to block risky sites and domains and our ZTNA to reduce lateral movement of threats.

Phishing and email security

Isolation not only stops harmful code in a phishing link from executing locally, but also prevents keyboard inputs of sensitive personal info. Plus, coming soon, admins will be able to activate email filtering with a single click – powered by Area 1.

Zero-day attacks

When a patch is available for the zero-day vulnerability, Cloudflare automatically deploys the patch to all remote browsers on our network. This means admins can protect devices while avoiding interruptions do not need to interrupt users from their work to force updates.

Secure contractor access

Isolate connections to specific hyperlinks — without installing any software on user devices. Use this clientless model to protect data that contractors interact with on unmanaged devices — without added configuration overhead.

Control input on suspicious sites

Admins can protect teams by isolating these high-risk websites like ‘Typosquatting’ and ‘Domains’ often used for phishing. Cloudflare serves the site in read-only mode and disables file uploads, downloads and keyboard input.

Integrate with third-party solutions

With our clientless deployment, admins can integrate Cloudflare with existing web or email gateways for a more gradual transition from legacy services. Send high-risk clicks to our remote browser and apply a custom block page or other protections.

Slide 1 of 2

Level up security with RBI today

資源

產品簡介:Cloudflare 瀏覽器隔離

概述 Cloudflare 瀏覽器隔離在威脅防禦與資料保護方面的優勢。

下載產品簡介
白皮書:常見的瀏覽器隔離挑戰,以及如何克服這些挑戰

了解與傳統瀏覽器隔離方法相關的最常見挑戰,以及 Cloudflare 的零信任平台如何幫助克服這些挑戰。

下載白皮書
Demo: Try Cloudflare Browser Isolation

Demo lightning-fast, secure browsing at the edge. No subscription, no installation, and no pixel pushing.

Try it now
Solution Brief: Email Link Isolation

Isolate email links and apply 'never trust, always verify' scrutiny to reduce attack surface and simplify operations. Soon, Cloudflare Area 1 customers will be able to turn on Cloudflare Browser Isolation to neutralize sophisticated multi-channel phishing threats.

Download PDF
停用您的 VDI

此部落格提供 Cloudflare 的觀點,瞭解遠端瀏覽器隔離如何協助組織卸載目前由虛擬桌面基礎結構 (VDI) 保護的內部 Web 應用程式使用案例。

瞭解更多
Webinar: Extend Zero Trust threat and data protection

In this on-demand webinar, Cloudflare will share how to integrate browser isolation into your threat and data protection strategy -- with no tradeoffs in experience for end users. You will also hear from Jonathan Lister Parsons, CTO and co-founder of PensionBee, who will share perspectives on evolving his organization's IT and security strategy and the role browser isolation plays in that journey.

Watch on-demand

其他資源

Developer Docs: Browser Isolation

Review developer documentation for how to set up and configure Cloudflare Browser Isolation.

Read dev docs
[2022 September] Blog: Isolate browser-borne threats on any network with WAN-as-a-Service

Learn how administrators can integrate Cloudflare Browser Isolation into their existing network from any traffic source such as IPsec and GRE via our WAN-as-a-service, Magic WAN.

Read the blog
[2022 June] Blog: Connect to private network services with Browser Isolation

Learn how to connect users to your private network via Cloudflare Browser Isolation.

Read the blog
[2022 March] Blog: Protecting zero day browser vulnerabilities

Learn how How Cloudflare Zero Trust provides protection from zero day browser vulnerabilities, including the high severability vulernability (CVE-2022-1096)

Read the blog
[2022 March] Blog: Clientless web isolation is generally available

Learn how to deploy Cloudflare Browser Isolation without any endpoint software. This approach makes easier to secure contractor access, control data movement within specific applications, and more.

Read the blog
[2021 December] Blog: Control input on suspicious sites with Cloudflare Browser Isolation

Learn about data protection controls in Cloudflare Browser Isolation to protect against phishing attacks and credential theft inside a web browser.

Read the blog
[2021 August] Blog: Data protection controls with Cloudflare Browser Isolation

Learn about features within Cloudflare Browser Isolation to protect sensitive data that users interact with in their web browsers.

Read the blog
Wired Article: Browser Isolation Takes On Entrenched Web Threats

Read Wired.com's coverage of Cloudflare Browser Isolation

Read the article
[2021 March] Blog: Browser Isolation for teams of all sizes

Read the blog announcing the general availability of Cloudflare Browser Isolation.

Read the blog