
March 21, 2026
Remote browser isolation is a billion-dollar market built on a simple idea: don't let the browser run on the user's machine. Run it somewhere else, stream the pixels back, and if the browser gets compromised, the attacker is trapped in a disposable box with nothing useful in it.
The problem isn't the idea. The idea is excellent. The problem is that vendors like Menlo Security, Zscaler, and Island charge $10–30 per user per month, route all your browsing traffic through their cloud, and lock you into their ecosystem. For a 500-person company, that's $60,000–$180,000 a year — for a browser.
Browser isolation runs web browsers in an environment completely separate from the user's device. All code execution, rendering, and downloads happen in the isolated environment. The user sees a visual stream of the session. If the browser is compromised, the attacker has no path to the user's machine.
Every browser is an attack surface. JavaScript execution, WebAssembly, PDF rendering, image decoders, font parsers — modern browsers have a massive surface area. Zero-day exploits targeting Chrome and Firefox appear regularly. Browser isolation eliminates the risk by moving the entire browser runtime off the endpoint.
Most vendor RBI solutions use containers for isolation. Containers share the host kernel, which means a kernel exploit can escape the container and reach the host. For high-security environments, this is an unacceptable risk.
Container escapes are not theoretical. CVE-2024-21626 (Leaky Vessels) allowed container escape via runc. CVE-2022-0185 allowed privilege escalation from a container to the host kernel. These vulnerabilities affect every container-based isolation product.
VMs are fundamentally different. Each VM runs its own kernel. The isolation boundary is enforced by the CPU itself (Intel VT-x, AMD-V). A compromised process inside a VM cannot access the host kernel, other VMs, or the host network — there is no shared kernel to exploit.
Build a purpose-built Linux VM with a hardened browser, deploy one per user or per session, and get full hardware-level isolation. No vendor cloud, no per-seat licensing, no traffic leaving your network.
Instead of paying a vendor to run browsers in their cloud, build your own browser isolation VMs with OpenFactory:
| Vendor RBI | Self-Hosted VM | |
|---|---|---|
| Isolation | Container (shared kernel) | VM (separate kernel, hardware-enforced) |
| Traffic | Routed through vendor cloud | Stays on your network |
| Cost | $10–30/user/month | Flat infrastructure cost |
| Trust | Vendor sees all traffic | Zero third-party trust |
| Control | Vendor-managed, limited customization | Full control over image and policy |
| Data residency | Depends on vendor regions | Wherever you deploy |
Browser isolation is critical for healthcare (HIPAA), government (FedRAMP), finance (PCI DSS), OSINT and threat intelligence teams, and any organization that needs to give contractors or BYOD users secure web access without exposing the corporate network.
OpenFactory builds a complete browser isolation VM as a bootable image in minutes. Describe what you need — a hardened desktop with Firefox, locked down to specific domains, with no persistent storage — and the system generates a deployable ISO.
No vendor contract. No per-seat licensing. No routing your employees' browsing through someone else's infrastructure. Your browser VMs, your network, your rules.