Go to search feature Go to content

Browser Isolation – No more web over-blocking?

Illustration of a computer network on a violet background

Have you ever been blocked from a website that you know is safe? You're not alone.

The statement that the internet is a dangerous place will not surprise anyone. Yet, for the modern corporation, the internet has become the new corporate network – with employees using it to access data in cloud applications as well as other resources on the web. SEB is no exception.

Users will keep clicking

The internet is an important part of the workplace at SEB, enabling employees to access information, email, cloud services, and various other web resources. That means employees will visit a large number of websites as they seek to do their job as efficiently as possible. It also means that it is unavoidable that they sometimes will end up on suspicious websites.

When a user clicks on a link on such a website, a malicious payload may be downloaded and executed by the browser even if the URL itself is not suspicious.

We either can block access to various websites at the expense of business productivity or incur risk by enabling wider access. For this reason, the Secure Web Gateways (SWG) are used on corporate networks to check web traffic and make sure that only safe sites are available for users while dangerous ones are blocked.

Illustration of a secure web gateway

Balancing between productivity and security

We always strive to achieve a balance between security and employee productivity. It is a difficult task that requires continuous attention and effort, as cyber-attackers constantly change their tactics in order to evade detection.

Hundreds of thousands of new sites are created every day. Many are safe and legitimate, but some are created purely for launching cyber-attacks.

To be able to handle such a number of websites in the most efficient way, Secure Web Gateways uses a URL categorization feature to check and filter website URL addresses against a database of known and categorized websites. The database has a vast number (billions) of URLs classified into different categories, such as, social networking, gambling, cloud storage, and shopping, etc.

One of those categories is called Uncategorized, and it is the primary reason for web security over-blocking, and the policy which is set to restrict access to such websites.

Why uncategorized sites exist and why they are a problem

While real-time AI categorization can classify a majority of new websites, some sites fail to be conclusively classified into a specific category. This issue might be due to a lack of information coming from the website itself.

The number of uncategorized websites is relatively small worldwide when compared to the total number of websites. However, in the traffic on any given day they still pose a problem for many security administrators.

Before the emergence of risk level ratings and browser isolation technologies, there were virtually only two ways to handle uncategorized sites: to allow the sites or to block them. Organisations that wanted tighter security typically blocked access to uncategorized sites, which typically resulted in a greater number of help-desk calls from users wanting to gain access to blocked sites. On the other hand, if access to uncategorized sites was allowed, it typically resulted in a higher rate of malware infection and a greater number of compromised systems.

Therefore, neither option worked well, and security professionals needed a better solution. That's why Secure Web Gateway vendors started introducing browser isolation features to help with the problems caused by uncategorized sites and other risky URLs.

What is Browser Isolation?

Browser Isolation is a cybersecurity model that aims to physically isolate an internet user's browsing activity – and the associated cyber risks – away from their local device and infrastructure.

By using Browser Isolation technology at SEB, we aim to reduce over-blocking for users by widening access to currently blocked websites and allowing access to uncategorized and potentially risky traffic while at the same time maintaining a desired security level and minimizing risks of malware infections.

How does it work?

Browser Isolation executes web sessions away from endpoints on the cloud-hosted disposable containers, sending only information that has been rendered safe to users' browsers. This prevents malware from reaching the network and devices.

These disposable containers perform actual browsing actions and transmit rendered information of the remote browser window back to the users' web browser.

In this way, any malicious code — whether it is downloaded automatically or by a user's deliberate action — is kept separate from the user's device. After a session, these containers are simply deleted, with all web content and any malware inside.

Illustration of a secure web gateway

Will it make web users happier?

We certainly think so. Just like all other cyber security teams, we want to keep our organisation from being included in any cyber-breach statistics.

We aim to achieve this by combining the Secure Web Gateway and Browser Isolation technologies. This allows us to protect users in real time from web threats targeting them from uncategorized sites or potentially unsafe URLs, while at the same time minimizing the number of support tickets requesting access to blocked sites that employees need to do their job. This helps us improve business productivity by reducing website over-blocking.

SEB Baltic Security Architect 

Donatas Miknevicius

SEB Baltic Security Architect 

Donatas Miknevicius


What are cyber-attacks about?

Welcome back to the SEB Tech blog. This time I want to describe different types of cyber-attacks and what they mean.

Illustration of a computer screen with a fishing crook inside an envelop

From non-functional requirements to cyber security hygiene

I think some still remember when non-functional requirements (NFR) were activities in a project plan and thus could be prioritized accordingly. However, this meant that important requirements for a system or application did not always get the focus that was needed - the time did not exist.

Illustration of toothbrush

Contact us

Do you have feedback or thoughts about future blog articles? Get in contact with us at the e-mail address below.