Page 83 - Cyber Defense eMagazine September 2023
P. 83

Additionally,  secure  browsers  can  leverage  the  distributed  computing  power  of  all  other
            browsers/extensions in their network for free rather than paying a SASE provider for high-cost cloud
            computing.

            Secure browsers offer better use of compute resources, reduce latency, improve performance issues
            and result in a better defense position.



            Why Is ‘Bring Your Own Browser’ Security a Better Option?

            While  both  secure  browser  forms  have  merit,  the  browser  extension,  or  “bring  your  own  browser”
            approach, is the better option for the following reasons:

               •  It’s easy to adopt. Users continue to use the browser they like.
               •  It’s easy to deploy. Users are familiar with other browser extensions for quick access to apps they
                   use every day.
               •  It enables the delivery of the same security services provided over SASE platforms.

            Some of the capabilities a secure browser extension can deliver include:


               •  Antivirus
               •  Antiphishing
               •  Data Loss Protection
               •  Secure Web Gateway
               •  Firewall
               •  More

            It’s early days for secure browser technology, but the sky is the limit.



            What is the Future of Secure Browser Extensions?


            A browser security module offers a range of exciting possibilities in the future. It has more capabilities
            than just a browser extension. Here are a few we’re building into the Overwatch CyberLab SWARM™
            Browser Security Module:

            Strength in numbers – If all users had secure browser extensions, then all browsers could talk to each
            other and share information to mount a better defense. So, for example, when one user (“patient zero”)
            clicks on a phishing link, other users will be automatically protected from doing so. It’s like a hive mind or
            herd immunity. We SWARM™ together, also known as Secure Web Application Response Module.

            Application Proxy – There’s only so much you can do inside the browser. However, if you extend the
            browser’s capability into the operating system (OS), you have nearly infinite capabilities. To make this
            happen,  we’ve  built  an  OS  Communication  Proxy™  that  bridges  the  browser  to  the  OS,  not  unlike
            middleware.






            Cyber Defense eMagazine – September 2023 Edition                                                                                                                                                                                                          83
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   78   79   80   81   82   83   84   85   86   87   88