About this software
Parallels Browser Isolation runs web browsing sessions in a remote, isolated environment so malicious web content does not reach endpoints. Administrators can enforce browsing policies, access logs, and controls from a central management console. The service delivers usable web content to users while keeping active content segregated from corporate devices, and it is offered as a cloud-hosted solution suitable for organizations seeking to reduce web-based attack exposure.
Purchase
Parallels Isolation
In Stock
Delivery: 1 working day
Loading...
€18.44
Free and without obligation
Do you need more information or looking for another license?
Benefits
- Endpoint threat reduction: Runs web content away from endpoints to limit malware exposure.
- Policy-based access control: Administrators can define browsing policies and restrictions centrally.
- Centralized monitoring and logging: Provides audit logs and session records for security review.
- User experience preservation: Delivers interactive web pages without exposing local systems to threats.
- Scalable deployment options: Supports cloud-hosted deployments that scale to organizational needs.
Available languages
- English
Support information
- Online documentation: Product manuals and configuration guides are available on the Parallels documentation site.
- Knowledge base articles: Searchable KB articles address common setup and troubleshooting scenarios.
- Technical support portal: Customers can open cases and track support requests through the Parallels Support Center.
- Product updates: Updates and release notes are posted on the product pages and documentation.
- Enterprise onboarding resources: Guides for deployment planning and integration are provided for administrators.
Frequently asked questions
What does Parallels Browser Isolation do?
It runs user browsing sessions in a remote isolated environment to prevent web-based threats reaching endpoints while delivering safe content to users.
How is Browser Isolation deployed in organizations?
Deployment is cloud-hosted; administrators provision the isolation service and apply policies through the management console.
What controls do administrators have?
Admins can set browsing policies, block risky content types, and review session logs through the management interface.
Which threats does this mitigate?
It reduces exposure to drive-by downloads, malicious scripts, and other web-based attack vectors by isolating active content.
What reporting does Browser Isolation provide?
The service offers logs and usage metrics for auditing and investigation via the administrative console.