Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Innovation

    Authentic8 Enhances Its Secure Browser Session Cloud Service

    Written by

    Chris Preimesberger
    Published October 23, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      One of the most interesting developments around enterprise applications is a new cloud-based security control layer for browsers that enables airtight utilization of any personal connected device for secure business use.

      Startup Authentic8’s service enables a browser session to take place within a secured container; the session then disappears completely after the task is done with no audit trail.

      Equipped with Authentic8’s cloud service, any browser can be secured by enterprise policies ahead of time based on the needs of the business and the employee. Because it’s all about the browser, any connected device can be used at any time to do the work.

      Obviously, the implications of this service for enterprise BYOD policies are numerous. Since the vast majority of crimeware, rootkits, spyware, viruses and other Web-transported malware enter a device via the browser, this effectively cuts the head off all those problems.

      Throw Away the Session When You’re Done

      Users have the ability to launch a browser instance, use it, and then throw it away without burdening the local system. Researchers can conduct research without compromising local environments and tipping their hands to potential intruders.

      The news from Authentic8 on Oct. 23, which makes the Silo cloud-based secure browser for business, is that it has expanded its product capabilities to include resources designed for information security research, incident response, emergency readiness, anti-fraud, and more.

      Where Silo is designed to control the use of Web-based services by executing in a sandbox and implementing data-level policy controls, the new configuration, called Toolbox, brings the same isolation but includes features necessary for researchers to do their jobs more securely.

      “These enhancements for infosec researchers are a direct response to the needs of our users,” said Scott Petry, founder and CEO of Mountain View, Calif.-based Authentic8. “Silo is a platform, and we will continue to enhance and extend its capabilities.

      “Our customers are constantly pulling Silo into new business processes. By moving the browser to the cloud and by extending the environment with a policy and configuration capability, they have embraced Silo across industries and roles.”

      Researchers Have Additional Requirements

      An early step in the information security research process is to access web content using the browser, Petry said. Thus, teams need to connect, download or store content, and perform analysis of malicious web code. Whether the user is a law enforcement agent or a compliance agent at a company, they need to conduct this research without exposing their environment to malware or revealing their identity. Toolbox is designed for this, Petry said.

      Some key data points about Authentic8 Silo Toolbox:

      –Toolbox is a browser built on demand at session start and destroyed at session end. This ensures that there is no data residue session over session.
      –The browser executes in a sandbox on Authentic8’s servers, creating an insulation layer between target Web code and the researchers network and device.
      –Toolbox includes a temporary file system that allows data to be downloaded within the sandbox to be analyzed, manipulated, or uploaded to other Web-based services.
      –Researchers can spoof different browsers and devices in order to analyze various types of Web code the target server delivers.
      –Toolbox can be configured to exit to the Internet from different international locations via Authentic8’s private global network of exit nodes. This means that a researcher can work safely at their desk, while appearing to be a local computer on the other side of the world.
      –Researchers can run multiple configurations of the Toolbox browser in a single Silo session, meaning that researchers conduct research processes in parallel, rather than a dedicated machine model.

      The idea is to make Toolbox an ideal on-demand, secure, and anonymous research tool, Petry said. Using Toolbox frees teams from the current pain of re-imaging dedicated systems, setting up private sub-networks, or implementing costly and dangerous local sandbox solutions.

      Toolbox is available now as a configuration of Silo. Pricing starts at $15 per user, per month. Go here to see a video of Toolbox in action. Risk-free trials can be run here.

      Authentic8 was founded in 2010 by principals from Postini, a secure email cloud service that was acquired by Google in 2007 and whose components are now being used in Google Apps.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×