Browsium Newsletter

At Least Until Skynet Ruins it, AI is Pretty Handy!

Posted by: Gino Tags: , Posted date:

Please share this with your security team!

Call me paranoid but everything that I have read about AI, like most technology, has its potential for good, and (very) bad. It’s the same old story, new technology creates new opportunities, and bad actors want more than their share…

Recently, two of our largest customers have queried us on specific security issues based on data points within the browser, specifically in relation to extensions and their permissions, and the ability for Browsium to configure who can use them. It seems that both companies view browsers as what they are –self-contained, mini operating systems that have potential attack surfaces – and wish to gain more visibility within them. One of the companies already employs our Browser telemetry tool, Proton, and has requested a more granular look at the extensions in their estate – both publicly facing, and internal. One specific example of granularity is the surfacing of the permissions that change when an extension is auto-updated. Anyway, this got me thinking about what data points are available inside a browser that could potentially be utilized by a security team. So… I asked ChatGPT a couple of questions. Below is the Q&A. Interestingly, my own semi-AI writing tool offered me a couple of rewrites “For Better Clarity”. Is there anything on these lists that your company would like to see a more granular view of? Please let me Know!

What are the most important data points in the browser for enterprise IT?

There are several important data points in the browser that enterprise IT should monitor to ensure a secure and efficient computing environment. Here are some of the key data points:

  1. Browser usage: It is important to monitor which browsers are being used by employees, as this information can help determine which browsers should be supported and which ones may need to be blocked.
  2. Browser versions: Knowing which versions of each browser are being used can help identify potential security vulnerabilities and ensure that the latest security updates have been applied.
  3. Plugin usage (including extensions: Monitoring which plugins are being used can help identify potential security risks and ensure that only authorized plugins are installed.
  4. Page load times: Slow page load times can impact employee productivity, so it is important to monitor and optimize page load times.
  5. Network traffic: Monitoring network traffic from browsers can help identify potential security threats, such as malware or unauthorized access attempts.
  6. User activity: Tracking user activity within the browser can help identify potential security breaches or policy violations.

By monitoring these key data points, enterprise IT can ensure a more secure and efficient computing environment for employees.

Additionally, here are some more specific data points that can be monitored within each category:

1. Browser usage:

  • Browser type (Chrome, Firefox, Safari, etc.)
  • Percentage of users on each browser
  • Browser market share trends over time
  • Browser usage by department or team

2. Browser versions:

  • Browser version number (e.g., Chrome 92.0.4515.159)
  • Percentage of users on each version
  • Security vulnerabilities fixed in each version
  • Compatibility issues with specific websites or applications

3. Plugin usage:

  • Plugin type (e.g., Adobe Flash, Java, Microsoft Silverlight)
  • Percentage of users with each plugin installed
  • Security vulnerabilities associated with each plugin
  • Usage patterns by department or team

4. Page load times:

  • Average page load time for each website or application
  • Time to first byte (TTFB)
  • Time to interact (TTI)
  • Page load times by browser type or version

5. Network traffic:

  • Incoming and outgoing traffic volumes
  • Traffic sources (e.g. internal vs. external)
  • Traffic patterns by department or team
  • Suspicious or unauthorized traffic patterns

6. User activity:

  • Websites visited
  • Time spent on each website
  • Downloads or uploads from each website
  • User logins and logouts

Proton White PaperProton GraphicProduct One Sheets

  • Share:  
 

Recent Posts

ITOM for Browsers: Visibility, Security, Efficiency with Proton
Posted on: March 27, 2024
The Browser Blind Spot: Is Your IT Management Missing Critical Data?
Posted on: March 25, 2024
Enhancing Enterprise Efficiency with Advanced Browser Management Tools
Posted on: February 12, 2024

Blog Topics

ActiveX Advanced Solutions Application Modernization Application Sandboxing BCMS Upgrade Browser Compatibility Browser compatibility issues Browser Compatibility Testing Browser end of life (EOL) frustration Browser IT Management Browser Management Browser management solution Browser Management Tool Browser Performance Monitoring Browser Selection Automation Browser Telemetry Tool Browser-Based Applications Browsium Browsium Chrome Extension Browsium Extension Browsium Ion Browsium Proton Catalyst Centralize browser management Chrome Compatibility Compatibility Challenges Compatibility Layers Compatibility Strategies Compatibility Testing Cross-Browser Testing CVE-2021-44228 Deployment eBook Edge IE Edge IE Chrome Edge IE Mode Edge Legacy Edge Readiness Emulation Enterprise Browser Management Enterprise Browser Security Events Extensions File Swap Firefox Flash EOL Group Policy History Hotfix How-To IE 11 EOL IE End of Life IE EOL IE11 Internet Explorer End of Life Internet Explorer EOL Ion Ion v4.9.4 IT Business Strategy IT Challenges IT Landscape IT Solutions ITOM Java Java Applets Latest Version Legacy Application Compatibility Legacy Application Integration Legacy Application Regression Testing Legacy Application Strategies Legacy Applications Legacy Browser Applications Legacy Browser Compatibility Legacy Web Applications Log4shell Microsoft Cumulative Update Migration Mission-Critical Applications Modern IT Modernizing Legacy Applications Patch Tuesday Performance Preserving Legacy Applications Product Offerings Product Release Proton Remediation Sandboxing Legacy Applications Security Services Shadow IT Silent Heroes Silverlight Support Testing Modernized Applications Flash EOL Top News User Training Virtualization Web Application Compatibility Webinar Win10 Preview Release Windows 10 Windows 8 XP Usage Share

Request Demo

Internet Explorer End of Life problems?Learn More