Must-Have Features of a Secure Virtual Browser

Illustration: Whitepaper Cover - Why a Virtual Browser is Important for Your EnterpriseSECURITY, POLICY

How did the local browser become the “security sinkhole" of today’s enterprise? And, more importantly, what’s the alternative ? How can enterprise IT leaders protect their infrastructure against web-borne threats, without putting productivity at risk by restricting web access?

Network security expert David Strom answers these questions in a new whitepaper, titled Why a Virtual Browser is Important For Your Enterprise . The whitepaper includes a detailed list of features that enterprise IT security managers should expect from “virtual” or “security-aware” browsers.

Illustration: Whitepaper Cover - Why a Virtual Browser is Important for Your Enterprise

Five of Strom’s (eight) criteria for how to pick the most secure browser for the enterprise:

  • the ability to “keep all browsing information protected on a separate and secure network”,
  • the option to “enforce corporate acceptable use policies to allow/block specific content categories and websites”,
  • “single sign-on features to allow users to share credentials for a collection of SaaS-based services”,
  • the “ability to add multi-factor authentication (MFA)”
  • “anonymous surfing” capabilities.

Phishing, drive-by attacks, ransomware, SQL injections, man-in-the-middle and other exploits all take advantage of the inherent security weakness of the local browser. This has IT security leaders exploring the virtual browser as a secure alternative.

Strom’s whitepaper provides enterprise-relevant selection criteria and can serve as a checklist for establishing state-of-the-art browser security. We think Silo meets the checklist pretty well.

See for yourself. Download the whitepaper here [PDF]:

Why a Virtual Browser is Important for Your Enterprise

PS: What makes a browser "secure"? For a general introduction, read  8 Must-have Features of a Secure Browser (Part 1) and 8 Must-have Features of a Secure Browser (Part 2) on this blog.

Gerd Meissner - Gerd writes, produces, edits, and manages content at Authentic8. Before, he covered information technology and data security as a journalist and book author in the US and in Europe.

Topics: News, Security, Remote Browser