Privileged Access Workstations and the Web
Some users have the digital keys to the kingdom: systems administrators, or administrators of critical systems. If the endpoints of these privileged access users are compromised by an attacker, that attacker can gain that same privileged access. With attack techniques such as Man in the Browser, an attacker can achieve that privileged access even when a “jump box” or other remote access approach is used.
It is therefore essential that these users’ endpoint devices
But web access is often an essential part of these privileged access users’ jobs. Modern systems administration requires constant research, looking for information about bugs, features and updates. Strong Internet research skills
Recommended by LinkedIn
How can this research be done if almost all websites are blocked?
One answer is to require users to use a second physical device for Internet research. But apart from the inevitable user push-back, there are real workflow problems that this can introduce. In many cases, research starts with links that are found in highly trusted systems which must only be accessed using the Privileged Access Workstation. If a second physical device is used, links must be retyped – often a hugely laborious task for complex URLs.
Strong Web Isolation (also known as Remote Browser Isolation) can provide the answer. Web Isolation solutions exist today that are trusted by some of the world’s leading governments to provide Internet access from even government classified endpoints: providing access to the online world while protecting critical national security secrets and systems. In the same way, commercial organisations can use strong Web Isolation solutions to achieve the seemingly impossible: access to even the riskiest websites without putting endpoints at risk.