The Secure Browser uses virtualization technology to provide a safer web experience to users and organizations. When using the Secure Browser any changes or malicious files inadvertently downloaded from the Internet are contained within the Secure Browser, keeping the underlying OS and computer protected from hostile changes. Any changes resulting from browser activity may be quickly and easily reset to effectively “undo” such changes and return it to its initially installed state. This makes it much easier to clean a system and bring the user back to full productivity. Secure Browsers also offer the option of specifying “white” and “black” lists to control what processes may be started or what sites may be visited. Limiting browser use to specific sites can control usage and protect from cross site scripting attacks. By specifying which sites are to be blocked, it makes it easy to keep users away from known bad sites, and thereby limit their exposure to attacks. In controlling what processes may be started, the browser will not run programs or plug-ins without permission to do so, which allows for the prevention of many attacks before they can even be initiated.
- Provides a virtualized and contained Firefox v3.6 Browser with Adobe Reader and Flash plug-ins
- Rapidly reset any changes made during normal use back to their initial state, enabling easy recovery from infections or attacks
- View statistics related to the number of processes detected and blocked
- Set white and black lists to limit access to known good sites, or prevent access to known bad sites to further limit the risk of attack and infection
Dell KACE K1000 Management Appliance
With the Dell KACE K1000 Management Appliance you are able to manage Secure Browsers organization-wide by enforcing white lists and black lists, reviewing statistics and even remotely resetting the Secure Browser back to its initial state. K1000 administrators may also easily customize a Secure Browser with desired settings and updates in order to generate a tailored Windows Installer setup. These can then be deployed to generate a configuration suited to the needs of any organization.
Learn more »