What to look for in a secure browser

There are five key capabilities you need to examine when comparing secure browser solutions. Only Passages completely addresses all of these requirements.

  • Isolation From The Local Computer

    Any secure browsing solution worth the name tries to isolate the potentially compromised browser from the local machine. Some do this by sandboxing, or by micro-virtualization, or by running a remote VDI.

    We believe that a full virtual machine is the best way to ensure protection against malware. With it we prevent all direct access to the local disk or other system resources. Additionally, we are able to run Linux as a guest operating system rather than Windows or Mac OS, thus hugely reducing the likelihood of infection — there are virtually no attacks on Linux desktops in active use by hackers.

    Our lightweight VM also imposes a lower burden on the computer and works on older computers better than micro-virtualization solutions.

    Learn more about isolating the browser from the local computer

  • Isolation From The Local Network

    If malware can easily pivot from an attack on the browser to an attack on other nearby devices, then it is providing little protection to the enterprise as a whole. Secure browser solutions must ensure that any attack or malware is prevented from accessing or scanning anything on the local network.

    Some solutions attempt to use internal firewall rules to prevent access to the commonly used non-routable address spaces. This fails in the face of sophisticated attacks and in any case where real IP addresses are exposed on the internal network. Passages uses a VPN to segregate all network traffic in or out of the virtual machine from the local network environment. This provides the most robust protection against attacks spreading through the enterprise.

    Learn more about isolating the browser from the local network

  • Functionality And Ease Of Use

    Users will circumvent any security solution that prevents them from doing their jobs efficiently. With Passages, users are free to browse all the web without the risk. Unlike other solutions that need to lock down sites through whitelisting or limit access to content for security, Passages protects users regardless of the site they are visitingPassages is serious about user experience. You can stream audio/video, view Flash and Java content, or use your favorite add-on or plugin — giving users all the power of the Internet without all the risk that typically comes with it.Passages even works smoothly when the available bandwidth is limited, unlike remote VDI based solutions.Finally, the Passages browser looks and feels just like Firefox — because it is Firefox. It can be set up as the user’s default, or only, browser so they don’t accidentally forget to use it. There is no need for costly training, arduous changes in user behavior, and best of all — no angry users.

  • Management And Reporting

    Enterprises can’t base their security on the hope that users will install and use security tools as directed. Unlike many secure browser solutions which act as stand alone endpoint or web-based applications, Passages integrates into the standard centralized deployment, management, and reporting systems that businesses are already using. User accounts can be managed through our administrative web interface, or directly through single sign on, Microsoft Domain Controller, and LDAP based authentication and account management systems.

    Passages provides usage reporting and analytics as well as direct activity feeds to Security Information and Event Management (SIEM) systems like Splunk and ArcSight.

  • Prevention Of Targeted Attacks

    In recent years, attacks have become much more targeted. Targeted watering hole attacks pose a huge threat to businesses. Hackers are narrowly targeting companies and/or individuals of particular interest as shown in the recent breach at Forbes. Because these attacks are often the most sophisticated, the associated malware is also the hardest to detect and avoid. Browser security solutions should prevent these attacks from happening in the first place by shielding the user’s identity. Passages uses a remote pool of IP addresses to providing a non-attributable browsing experience. In addition Passages ensures that unwanted cookies and other trackers are destroyed at the end of every session.

All The Web Without The Risk

Get Passages