Citrix Remote Browser Isolation vs Talon comparison

Cancel
You must select at least 2 products to compare!
Citrix Logo
25 views|21 comparisons
Talon Cyber Security Logo
399 views|327 comparisons
Ranking
Views
25
Comparisons
21
Reviews
0
Average Words per Review
0
Rating
N/A
34th
Views
399
Comparisons
327
Reviews
0
Average Words per Review
0
Rating
N/A
Comparisons
Also Known As
Citrix Secure Browser
Learn More
Talon Cyber Security
Video Not Available
Overview

Remote browser isolation – without limiting access

Keep your data safe from browser-based attacks

When it comes to security, the internet is among your biggest enemies. Which is a problem, since employees need the web to stay productive. That’s what Citrix Remote Browser Isolation (formerly Citrix Secure Browser) is for. This cloud-hosted browser lets you thoroughly protect your network—without complicating the experience for users.

Talon is a security-focused browser that aims to protect organizations and their data from a wide array of threats. Built on the Chromium platform, Talon incorporates several advanced security features integrated inside the browser.

One of its standout features is sandboxing, a technology that isolates each browser tab and website in its own protective environment. This means, if a tab or a website were to be compromised, the negative effects wouldn't spill over to other tabs or websites. Furthermore, Talon provides file scanning capabilities, thoroughly checking all files downloaded from the internet for any malware, reducing the risk of harmful infections. It also includes phishing protection that effectively blocks suspicious websites and emails, protecting users from deceptive attacks. Additionally, Talon is equipped with an intrusion detection system that identifies and blocks any malicious code trying to infiltrate the system. Lastly, it boasts a data loss prevention feature, which helps to stop users from unintentionally or deliberately leaking sensitive data. Overall, Talon serves as a robust shield against numerous online threats, ensuring a secure browsing experience.

Talon is easy to use and can be deployed in a variety of ways: Cloud deployment, allows users to access Talon from any location, promoting remote work capabilities and convenience. Alternatively, for organizations seeking greater control over their data, Talon can be deployed on-premises, ensuring that all data stays within the organization's local infrastructure. Another deployment method is the managed service option, where a third-party is entrusted with the task of overseeing the browser's security.

Talon's security features can help to protect users from a variety of threats, including malware, phishing, and data loss. Talon can help to reduce IT costs by reducing the need for expensive security software and hardware.

    Sample Customers
    Information Not Available
    Lemonade, Rapyd, Telit Cinterion, Landry’s, Golden Nugget, Houston Rockets
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm18%
    Computer Software Company17%
    Retailer8%
    Healthcare Company6%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm16%
    Manufacturing Company12%
    Healthcare Company6%
    Company Size
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise6%
    Large Enterprise69%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise10%
    Large Enterprise65%

    Citrix Remote Browser Isolation is ranked 5th in Remote Browser Isolation (RBI) while Talon is ranked 34th in Secure Web Gateways (SWG). Citrix Remote Browser Isolation is rated 0.0, while Talon is rated 0.0. On the other hand, Citrix Remote Browser Isolation is most compared with Cisco Umbrella, Axis Security, Menlo Security Secure Web Gateway and Zscaler Internet Access, whereas Talon is most compared with Island, Google Chrome Enterprise, Zscaler Internet Access, Menlo Security Secure Web Gateway and Prisma Access by Palo Alto Networks.

    We monitor all Remote Browser Isolation (RBI) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.