Safe Browsing
Enterprise safe browsing helps mitigate two classes of threat:
- Compromise of organizations’ endpoints via browser exploitation and web-based attacks
- Compromise of organizations’ users and their identities thru the browser from phishing or session cookie and token theft
A safe browser for enterprise requires protection that goes beyond the consumer-grade anti-malware and anti-phishing features, which rely on signatures and categorization lists that only provide protection against well-known malicious files and URLs.
Enterprise safe browsing capabilities
Bridging the patch gap
- Is injected directly into the browser runtime, providing protection that other web security tools cannot
- Implements a form of Moving Target Defense (MTD) similar to Address Space Layout Randomization (ASLR) that disrupts exploits without the use of any detection techniques
- Immunizes the browser against memory corruption vulnerabilities that are targeted by the first exploit in the exploit chain
Protecting credentials
Phishing is one of the primary techniques adversaries use to gain unauthorized access to enterprise resources. Browsers play a pivotal role in phishing attacks since their success depends on users supplying their credentials to malicious sites. Browsers also store important authentication material such as session cookies and tokens that may be stolen if an adversary successfully compromises a browser.
Seraphic is the only solution that protects against 0-hour/ “golden hour” phishing attacks with a unique Detection Engine that:
- Measures and evaluates 200+ runtime parameters to identify malicious sites in real time, without site classification or threat feeds
- Detects and blocks UI redressing attacks such as Browser-in-the-Browser (BitB) and clickjacking that are commonly used on phishing sites
- Is not susceptible to evasion techniques (such as Captcha) that circumvent automated phishing protection tools
Seraphic also guards authentication material used or stored in the browser by:
- Encrypting session cookies and tokens to prevent theft and user impersonation
- Blocking password re-use between different sites or accounts
- Alerting organizations if their users’ credentials have been exposed in a data breach
Stopping web-based attacks
- Adversary-in-the-Middle (AitM) attacks that can compromise sensitive data
- Attacks used for malware delivery, such as Cross-Site Scripting (XSS), drive-by downloads, and HTML smuggling
- Network scanning (via the browser) that aids attackers in identification of additional targets
- Cryptojacking that consumes compute resources and provides financial resources to threat actors
Enforcing Acceptable Use Policies (AUPs)
Logging
Using Seraphic Security for enterprise safe browsing
- Need safe browsers for the enterprise to protect its hybrid workforce
- Want to avoid major infrastructure and software deployments or modifications
- Are seeking an alternative to browser isolation solutions