Google Chrome: The most popular web browser on the market. Its ease of use and fluidity to link across all of Google’s services is unparalleled. However, with a platform used by hundreds of millions around the world, this also makes them an attractive target for cybercriminals.
With zero-day attacks, these cannot be known by Google until it has been exploited. An exceptional browser needs the security protection that its users deserve. When a user accesses a malicious site that exploits an unknown, unpatched flaw, the device becomes compromised. They are at the mercy of the hacker and their requests.
This is where Puffin Cloud Isolation comes in. Instead of the content directly coming into contact with the user’s device, all the data processing and requests are performed within our cloud network. When website info goes through Puffin’s servers, our proprietary graphics language converts it to a new html layout. From a visual standpoint everything looks to be the same on the surface, but because the backend has been completely rewritten, any unresolved flaws that can be resulted in hacker exploits will not reach the end user.
Below is a video showcasing how Puffin Cloud Isolation works in a simulated environment.
To start using Puffin Cloud Isolation, click here.
*Puffin Cloud Isolation is also available for Microsoft Edge.