Mitigate Web-Based Malware Risk Through Browser Isolation


The strategic alliance between ELEVI and Light Point Security combines the malware-free browsing capabilities of the industry leading Light Point Web Full Isolation Platform™, the only browser isolation technology in the Cyber Security market today, and ELEVI’s expertise in cyber security and technology for Fortune 100 and government customers.

Light Point Web provides full isolation from all web content and seamless integration with existing browsers, today announced a strategic partnership with ELEVI Associates, a leading technology and cyber security value-added provider serving customers in government, including the Department of Defense, and commercial markets throughout North America. ELEVI will incorporate Light Point Security’s web isolation platform into their security practice, enabling their customers to significantly enhance their security posture.

Free White-Paper Download
Eliminating the Most Serious Threat to Your Hospital’s Network: Web-Based Malware

Please check to verify you're human

Benefits and Features

Isolated Browsing

Protecting you from even the newest and most advanced web-based malware

Integrates Seamlessly

Works with existing browsers, making it the easiest to use product in its class


Administrative Dashboard gives customers more power than ever

Like Nothing Before

Light Point Web, is the most advanced fully-isolated web browser ever created, and the only one that integrates into existing browsers. It moves the dangerous task of executing web content off of your computer and isolates it in a one-time-use remote virtual machine. No website code ever reaches your computer, only a real-time interactive image of the websites you visit. Light Point Web integrates seamlessly into your standard web browser. You can continue to use your favorite web browser; only now you are fully isolated from all web threats.

Light Point Web is the easiest to use product in its class. Users do not even need to know it is installed to use it. You can navigate to URLs, click links, watch videos, download files, etc. – just like users would expect.

The founders of Light Point Security gained unique insights on the state of cyber security during their time spent security the nation’s information and physical assets within the National Intelligence Community. This experience made it clear that web browsers are the most serious threat to network security, and that traditional, detection-based security products could never keep up.


Light Point Security invented the concept of using a remote, isolated web browser to finally address the biggest threat facing enterprises.

Use Cases


Use Light Point Web for all web browsing to protect your network from drive-by downloads, Java and Flash exploits, and any other threat on the web.


By using Light Point Web, you get detailed statistics about your employee’s browsing activity. Get insightful reports about how long users are browsing, and on which sites they spend their time.


Media companies must comply with strict network security regulations. Light Point Web is one of the few approved methods to access the web from within the content production network.


Merchants who accept customer credit card data must comply with PCI-DSS. Light Point Web is one of the few approved methods to browse the web from within the cardholder data network.


When using Light Point Web Cloud, websites are unable to determine your IP address or location. They can only see information about our cloud servers, and nothing about you.


The Light Point Web File Upload and Clipboard Policies give you complete control of what gets uploaded or pasted to the web. And all uploads are logged in a searchable report.


Web proxies can frustrate employees by blocking access to sites that they need. Light Point Web can work with your web proxy to let your employees access these blocked sites safely.


Light Point Web makes it extremely hard for ransomware to infiltrate your network through the web browser. Additionally, it lets you configure your firewall to neutralize ransomware introduced through other means.