
Ericom Shield
Browser isolation software
Web security software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Ericom Shield and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Banking and insurance
- Public sector and nonprofit organizations
- Healthcare and life sciences
What is Ericom Shield
Ericom Shield is a remote browser isolation (RBI) and web security product that executes web browsing sessions in an isolated environment and streams a safe rendering to the user device. It is used by security and IT teams to reduce exposure to web-borne threats such as malicious scripts, drive-by downloads, and phishing pages while allowing access to untrusted or unknown sites. The product typically integrates with enterprise access controls and security stacks (for example, secure web gateways, proxies, and identity providers) to apply policy and logging. It is commonly deployed for high-risk user groups, third-party access, and research/browsing use cases where endpoint risk must be minimized.
Strong web threat containment
The core design isolates active web content away from the endpoint, which reduces the chance that browser exploits or malicious code executes locally. This approach is well-suited for protecting users when they must access unknown or untrusted sites. It can also help limit the impact of zero-day browser vulnerabilities because the browsing session runs in an isolated environment rather than on the device.
Policy controls for web access
Ericom Shield supports applying access policies to web sessions, which helps organizations control risky actions such as file downloads, uploads, copy/paste, and printing. These controls are useful for regulated environments and for limiting data movement during web-based workflows. Centralized policy enforcement can provide more consistent outcomes than relying on endpoint-by-endpoint browser hardening.
Fits layered security architectures
The product is commonly positioned to work alongside existing web security and identity components rather than replacing them. This makes it practical for organizations that already use secure web gateways, proxy infrastructure, or SSO and want an additional isolation layer for high-risk browsing. It can be deployed selectively for specific users, groups, or destinations to target the highest-risk traffic.
User experience trade-offs
Browser isolation can introduce latency and rendering differences compared with local browsing, especially for media-heavy or highly interactive sites. Some web applications may not behave identically due to isolation constraints and policy restrictions. Organizations often need to tune policies to balance security with usability for business-critical sites.
Operational and cost overhead
RBI typically requires additional infrastructure or cloud capacity to run isolated sessions at scale, which can increase operational complexity. Sizing, high availability, and performance monitoring become important as usage grows. Licensing and compute costs can be higher than simpler web filtering approaches, particularly for broad user populations.
Not a complete web security stack
Ericom Shield focuses on isolating web sessions, but organizations still generally need complementary controls such as URL filtering, CASB/DLP, endpoint protections, and email security to address other attack paths. Isolation reduces execution risk, but it does not automatically solve identity compromise, credential theft outside the session, or broader data governance requirements. Buyers should evaluate how logging, reporting, and incident workflows integrate with their existing security operations tools.
Seller details
Ericom Software Ltd.
Closter, New Jersey, United States
1993
Private
https://www.ericom.com/
https://x.com/ericom
https://www.linkedin.com/company/ericom-software