Ericom’s New ZTEdge Web Application Isolation Addresses Security Issues Associated With Accessing Third-Party Contractor Applications


Ericom Software, a leading provider of Zero Trust cloud cybersecurity solutions and developer of the ZTEdge™ SASE platform, today announced the introduction of ZTEdge Web Application Isolation, an innovative cloud-delivered security solution which solves a critical access security issue faced by nearly every organization that embraces the flexibility enabled by third-party workers. Specifically, these companies need to provide contractors, who typically use unmanaged devices (e.g., laptops or personal PCs provided by their employers), access to company applications, while ensuring that these systems will not be compromised by malware and that sensitive data cannot be mishandled or stolen. .

The Third-Party Access Challenge

Flexible work environments and outsourcing have transformed the modern corporate workforce. Using third-party specialists brings efficiency and expertise to organizations, but also introduces risks to their data, applications, and networks. Personal BYOD devices or laptops provided by the companies the third-party consultants work for are generally not managed by the contracting organization and therefore pose very real risks as they generally lack up-to-date security controls present in the organization. managed devices issued to employees. If unmanaged devices are compromised, they can download malware into an app, which can lead to downtime, breaches, or ransomware attacks. Additionally, sensitive data that is downloaded or cut-and-pasted onto unmanaged devices for legitimate use, or cached in a device’s web browser, is at risk of being exposed intentionally or inadvertently. Unfortunately, once users have logged in, the reverse proxy-based solutions within CASBs or WAFs that are currently used to control access to unmanaged devices provide dangerously little control over data security or malware prevention.

Isolation of web applications

ZTEdge Web Application Isolation enables organizations to provide simple and secure access to private and public cloud or web-based enterprise applications that workers using unmanaged devices need for their jobs, whether they are sub- contractors or third party employees. Leveraging Remote Browser Isolation (RBI) and easy-to-define granular user-level policies, ZTEdge Web Application Isolation works with other systems to control which applications each user can access and, once inside , the actions it can perform.

For example, an employee might be allowed to edit a file in Office 365 but not download it to their unmanaged device, while a contractor might be restricted to viewing data only. Policies can also be used to control what content (if any) can be uploaded to organizational networks or web or cloud applications, and by whom. Content disarming and reconstruction (CDR) can be applied to ensure that all content and files on unmanaged devices are free of malware and threats before downloading. Additionally, Data Loss Prevention (DLP) can be used to protect against exposure of confidential material and PII in downloads.

To protect against misuse or theft of credentials, access to SaaS and web applications can be restricted to connections originating from the dedicated IP address of the organization’s Web Application Isolation tenant. Additionally, built-in IAM features allow for quick onboarding of employees and contractors, and also makes it easy to revoke access privileges when contracts end or employees leave.

The Power of Remote Browser Isolation

ZTEdge Web Application Isolation is the latest innovative solution to use Ericom’s core Remote Browser Isolation (RBI) technology. In addition to web application isolation, Ericom’s RBI-based solutions include:

  • Web Browser/Email Isolation – RBI protects endpoints against advanced malware, ransomware and other device-targeting threats from the web and email, by intelligently categorizing websites/URLs and isolating sites at risk in the cloud, remotely from devices. For added protection against phishing attacks, websites are presented in “read-only” mode to prevent credential theft.
  • Instant Messaging (IM) Isolation – RBI protects users of popular instant messaging platforms such as WhatsApp by scanning end-to-end encrypted traffic – a blind spot for traditional Secure Web Gateway (SWG) products – to prevent distribution of malware and data exfiltration.
  • Virtual Meeting Isolation – This patent-pending Ericom solution brings the power of web isolation to secure virtual meetings on the web like Zoom and Teams. Users get a completely standard virtual meeting experience, but endpoints and networks are protected from malware hidden in links and other shared media, and IT can apply sharing controls to protect data.

“Web Application Isolation is the latest example of Ericom tackling big security challenges and successfully delivering solutions that are simpler and more effective than current approaches,” said David Canellos, CEO of Ericom Software. “Our Web Browser Isolation, Instant Messaging Isolation, and Virtual Meeting Isolation solutions address use cases that Secure Web Gateway and Secure Email Gateways couldn’t handle, and Web Application Isolation now does the same for existing WAF, CASB and ZTNA solutions. I am thrilled to see the dramatic positive impact our innovative solutions are having on the security of our customers.

Ericom’s isolation solutions can be licensed individually or as part of its ZTEdge SASE platform. Learn more at

About Ericom Software
Ericom Software is a leading provider of cloud-delivered Zero Trust cybersecurity solutions that protect today’s digitally distributed organizations from advanced security threats. The company’s ZTEdge™ platform is the industry’s first Secure Access Service Edge (SASE) solution developed specifically for midsize and small businesses. Ericom’s solutions leverage innovative remote browser isolation, application isolation, micro-segmentation and virtualization technologies, and are delivered on Ericom Global Cloud, a distributed elastic cloud platform high availability. Ericom’s cybersecurity solutions protect thousands of businesses and millions of end users around the world. The company has offices around the world and a global network of distributors and partners.

Comments are closed.