The Solution:
Separating Users from the Internet

To physically separate users from the internet, browser and email applications are moved from user devices to an isolation computer located outside the corporate network. Any attacks originating from the internet take effect exclusively on this isolation computer — no longer within the corporate network. Malicious code cannot penetrate the network and therefore cannot access company data.
Remote Control of Browser and Email
An app on the user's device (PC, laptop, tablet, smartphone) transmits all user input — from keyboard, mouse, touchpad, camera, and microphone — to the isolation computer, effectively functioning like a remote control. Users continue to operate their browser and email as they normally would, using keyboard and mouse or touchpad.
Data Transfer to Users
Data downloaded from the internet via browser or email on the isolation computer may contain malicious code. To prevent any risk, the images displayed on the isolation computer’s screen are essentially “photographed” — pixel data is read out and sent to users within the corporate network. Pixels cannot contain malicious code.