Authentic8 Enhances Its Secure Browser Session Cloud Service
Browser session takes place within a secured container; session then disappears completely after the task is done with no audit trail.One of the most interesting developments around enterprise applications is a new cloud-based security control layer for browsers that enables airtight utilization of any personal connected device for secure business use. Startup Authentic8's service enables a browser session to take place within a secured container; the session then disappears completely after the task is done with no audit trail. Equipped with Authentic8's cloud service, any browser can be secured by enterprise policies ahead of time based on the needs of the business and the employee. Because it's all about the browser, any connected device can be used at any time to do the work. Obviously, the implications of this service for enterprise BYOD policies are numerous. Since the vast majority of crimeware, rootkits, spyware, viruses and other Web-transported malware enter a device via the browser, this effectively cuts the head off all those problems.
Throw Away the Session When You're Done
--The browser executes in a sandbox on Authentic8's servers, creating an insulation layer between target Web code and the researchers network and device.
--Toolbox includes a temporary file system that allows data to be downloaded within the sandbox to be analyzed, manipulated, or uploaded to other Web-based services.
--Researchers can spoof different browsers and devices in order to analyze various types of Web code the target server delivers.
--Toolbox can be configured to exit to the Internet from different international locations via Authentic8's private global network of exit nodes. This means that a researcher can work safely at their desk, while appearing to be a local computer on the other side of the world.
--Researchers can run multiple configurations of the Toolbox browser in a single Silo session, meaning that researchers conduct research processes in parallel, rather than a dedicated machine model. The idea is to make Toolbox an ideal on-demand, secure, and anonymous research tool, Petry said. Using Toolbox frees teams from the current pain of re-imaging dedicated systems, setting up private sub-networks, or implementing costly and dangerous local sandbox solutions. Toolbox is available now as a configuration of Silo. Pricing starts at $15 per user, per month. Go here to see a video of Toolbox in action. Risk-free trials can be run here. Authentic8 was founded in 2010 by principals from Postini, a secure email cloud service that was acquired by Google in 2007 and whose components are now being used in Google Apps.