With Jimber Browser Isolation, an extra layer, a container, is built between the Internet and the computers within your company. A virus or cyberattack stops in the isolated Jimber container, is removed when the session is closed and no longer poses a threat to your organization.
I like that it works well with all browsers (chrome/firefox etc.).
It's easy for my team of users as they don't need much setup but can quickly get up-and running without issue! No downside so far :) - there are always new things you might want out from this software which isn’t possible yet unless paid upgrades occur.- currently unable to use any chrome extensions via jimbo browser isolation due security settings changes. This may be something we look into once more people start using JBI…
Pros
Easy access across devices, no extra logins required & good support when needed too !!!
Cons
Nothing really comes around mind in regards what i dislike about JBI
It's not easy for me as I'm from another country (Mexico) so it takes time until they answer my emails about this product; however after that everything goes fine! As with any other software there are bugs but we solve them quickly because of their support team which helps us at every moment.
If you want security without sacrificing performance then use jimbers browser isolation!! We were having problems using our web apps remotely due some browsers have been infected by phishing sites like…
Pros
No need to install additional plugins
Very good integration between different platforms, including mobile devices
Best user experience when working remotly or accessing remote resources through ssh tunneled connection
Very simple to set up, and a few minutes to set up the rules. We were able to quickly detect and fix a vulnerability in a customer's site that was a vector for malware. We have not encountered any difficulties with Jimber. Customer had issues with the web browser and was trying to identify the browser. We have been able to identify the browser in order to help the customer.
I like that it's easy to use and configures itself with little effort. It has been very effective at blocking malware from
Pros
Easy
Fast configuration process; works smoothly once setup.