fitgap

Ericom Shield

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Ericom Shield and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Banking and insurance
  2. Public sector and nonprofit organizations
  3. Healthcare and life sciences

What is Ericom Shield

Ericom Shield is a remote browser isolation (RBI) and web security product that executes web browsing sessions in an isolated environment and streams a safe rendering to the user device. It is used by security and IT teams to reduce exposure to web-borne threats such as malicious scripts, drive-by downloads, and phishing pages while allowing access to untrusted or unknown sites. The product typically integrates with enterprise access controls and security stacks (for example, secure web gateways, proxies, and identity providers) to apply policy and logging. It is commonly deployed for high-risk user groups, third-party access, and research/browsing use cases where endpoint risk must be minimized.

pros

Strong web threat containment

The core design isolates active web content away from the endpoint, which reduces the chance that browser exploits or malicious code executes locally. This approach is well-suited for protecting users when they must access unknown or untrusted sites. It can also help limit the impact of zero-day browser vulnerabilities because the browsing session runs in an isolated environment rather than on the device.

Policy controls for web access

Ericom Shield supports applying access policies to web sessions, which helps organizations control risky actions such as file downloads, uploads, copy/paste, and printing. These controls are useful for regulated environments and for limiting data movement during web-based workflows. Centralized policy enforcement can provide more consistent outcomes than relying on endpoint-by-endpoint browser hardening.

Fits layered security architectures

The product is commonly positioned to work alongside existing web security and identity components rather than replacing them. This makes it practical for organizations that already use secure web gateways, proxy infrastructure, or SSO and want an additional isolation layer for high-risk browsing. It can be deployed selectively for specific users, groups, or destinations to target the highest-risk traffic.

cons

User experience trade-offs

Browser isolation can introduce latency and rendering differences compared with local browsing, especially for media-heavy or highly interactive sites. Some web applications may not behave identically due to isolation constraints and policy restrictions. Organizations often need to tune policies to balance security with usability for business-critical sites.

Operational and cost overhead

RBI typically requires additional infrastructure or cloud capacity to run isolated sessions at scale, which can increase operational complexity. Sizing, high availability, and performance monitoring become important as usage grows. Licensing and compute costs can be higher than simpler web filtering approaches, particularly for broad user populations.

Not a complete web security stack

Ericom Shield focuses on isolating web sessions, but organizations still generally need complementary controls such as URL filtering, CASB/DLP, endpoint protections, and email security to address other attack paths. Isolation reduces execution risk, but it does not automatically solve identity compromise, credential theft outside the session, or broader data governance requirements. Buyers should evaluate how logging, reporting, and incident workflows integrate with their existing security operations tools.

Seller details

Ericom Software Ltd.
Closter, New Jersey, United States
1993
Private
https://www.ericom.com/
https://x.com/ericom
https://www.linkedin.com/company/ericom-software

Tools by Ericom Software Ltd.

Ericom Connect Enterprise
Ericom AccessNow
Ericom AccessToGo
PowerTerm WebConnect
Ericom Shield
Ericom PowerTerm

Best Ericom Shield alternatives

Cloudflare SSE & SASE Platform
Authentic8 Silo for Research
HP Wolf Enterprise Security
Puffin Secure Browser
See all alternatives

Popular categories

All categories