This document discusses the risks of web browsers and how hardware-based browser isolation can help address them. It notes that browsers are the most common attack vector but also the most important application. Current detection-based tools are ineffective against unknown attacks. The document proposes hardware-based browser isolation using a separate physical network to isolate the browser from endpoints. This would eliminate browsers as an attack vector and reduce costs while restoring secure web access. It describes the Isla isolation architecture and deployment scenarios like using Isla in a DMZ or in-line with other security tools.