Browsium Browser Management Suite v4.9
Support for Chromium Edge IE Mode is now available for our entire suite of products. If you are an Ion customer, it is imperative that you update to v4.9 before June of 2022 (The end of IE11 Support in Windows 10). I have or will be shortly sending out to each of you the Download Portal links and basic upgrading instructions.
Those of you upgrading from v4.5 or later already have a license server in place, so there are only a couple of requirement changes. Please note that the license server (BCMS) must be upgraded before each product(s) is upgraded. The newest version of BCMS is always backwards compatible to the Browsium Client.
If you are upgrading from a version earlier than v4.5, you will need to add a license server (BCMS). The requirements for the server vary depending on the product(s) and number of seats in your environment. Please contact [email protected] for individual hardware recommendations for pre v4.5 of Browsium Software.
Now that v4.9 is here, one of the most powerful cornerstones of our Browser Management Suite, Catalyst, should be on everyone’s radar. Once IE is no longer a stand-alone product, it will be necessary to redirect IE URLs to Edge IE Mode. Although there is the clumsy Enterprise Site List Manager, wouldn’t it be better to have a fully supported integrated tool that allows you to use complex rule sets to manage every major browser?
|Support for Chromium Edge IE Mode is now available for our entire suite of products
Microsoft Office Zero-Day Hit in Targeted Attacks
Early last month there was (another) zero-day attack that had our ActiveX page pinging like mad on our website. Microsoft’s September update or the September 7th fix shields you for now – but remember, IE’s retirement looms.
Stop me if you think you’ve heard this one before… We all know that MS would like to get everyone off IE, like, yesterday. We also know that there are countless mission critical application in the wild that require IE that are either too costly to rewrite, or, worse, required for the operation of specialized hardware. So, the issue is – wait for it – what can be done to minimize the security threats that are, sadly, inherent to the long in the tooth browser.
There is only one tool in the industry which – in near real time – allows you to inventory every application add on and dependency in IE for each user. In other words, every dangling piece of ActiveX in the IE environment for each user can be seen to evaluate its threat potential… PROTON was designed to complement existing ITOM installations by extending the browser’s visibility, and delivering the crucial data and information needed for managing a web application-based portfolio. Proton running within the browser provides telemetry data on any web application including the browser itself, detailed dependencies, inventory data, third-party extensions and add-ons, as well as page-level security statistics. In other words, graphs and stats from inside of each users’ browsers to proactively remediate risk.
|The company described the attacks as “targeted,” code-speak for the types of Windows malware implants used for government cyber-espionage or corporate data theft.
Ryan Noraini, SecurityWeek