May 18th, 2023, Edition 10, Volume 2
Last month a Microsoft Cumulative Update broke Browsium Ion’s ability to perform a file swap, necessitating a hotfix (see original message and instructions below). Normally, when Microsoft makes a change that affects our code, we have time to engineer any necessary changes in advance (Edge IE Mode, for example). This time, we were caught unaware.
To avoid any future disruptions, we have instituted a new policy of compatibility testing of each of our products with the Win10 preview release that is available in advance of the traditional “Patch Tuesday” release date (the 2nd Tuesday of the month).
v4.9.4 Required for all Ion Users
Although we strongly recommend, as a best practice, upgrading BCMS before upgrading the Ion client, it is not necessary to upgrade BCMS if you currently have deployed v4.9+. If the current version of the Ion Client is LESS than v4.9, BCMS MUST be upgraded before upgrading the client to v4.9.4., and the following additional step must be completed so that the Browsium Extension will continue to function as required:
Once v.4.8.* BCMS and the Client have been upgraded to 4.9.4, the Browsium Chrome Extension that includes Edge IE Mode (Edge group policy for ExtensionInstallForceList) must = adociibhpcfhbfkahfbdkakmehnmnkgd;http://crx.browsium.com/browsium-chrome-4.9.4.xml in your Browsium Group Policy.
Please let me know if you require a link to your Browsium Download Portal.
As always, we thank you for your continued support! Please see below for a brief description of all our product offerings. If you would be interested in further details, a demo, or a PoC, please let me know, and I’ll set it up!
“To avoid any future disruptions, we have instituted a new policy of compatibility testing of each of our products with the Win10 preview release that is available in advance of the traditional “Patch Tuesday” release date (the 2nd Tuesday of the month).”Team Browsium
Enterprise IT has always closely monitored the IT environment for efficiency and security via detailed telemetry and reporting.
Most management tools (ITOMs), however, were designed before the Web became the dominant delivery system for Enterprise Applications. As a result, visibility into the most used and security-vulnerable application, the Browser, is nearly non-existent.
The Browser is effectively a black box for IT Management
Traditional ITOMs monitor everything in a Windows OS all the way to packaged applications. Unfortunately, the visibility into where users spend most of their time stops there. Simply put, the browser has evolved over the years from an animated switchboard to what amounts to an operating system within an operating system; an internal OS that is invisible to IT Management.
For IT Administrators
Proton gives you a complete view of everything that happens within the browser on a per-user basis, including detailed inventory information and URL-specific performance and activity reporting. With Proton, you can quickly identify what every user is attempting to access including dangerous Legacy Application platforms (Java, ActiveX, etc.), as well as the breadth of emerging extensibility provided through the latest Browser Extensions.
For IT Security
Unlike conventional applications, the browser and the web present multi-pronged threats. Proton can quickly help clarify critical security questions when time is short. Using a single tool, you can assess and quantify risk from emerging web security issues across the enterprise.
For Business Owners
Proton enables you to measure the application value to the organization through usage and enhanced telemetry metrics. This telemetry allows business owners to understand the impacts of adopting modern technology without breaking or replacing existing solutions.
Browser Visibility = Enhanced Efficiency and Security
Can you afford not to know what your users are doing in the modern browser?
By deploying a client that reads centrally managed profiles, Browsium Ion ensures the secure and functional operation of web applications without requiring server-side code changes. It supports various features such as Java version management, application sandboxing from the wider internet, Flash virtualization, string replacement, migration, acquisition legacy app compatibility, compliance adherence, and regression testing. Ion allows organizations to maximize their return on investment by securely using legacy systems until they are ready to replace them.
Ensure Compliance and Security for Modern Applications
Controlling all aspects of the browser environment enables organizations to define granular policies based on the needs and goals of the application without impacting other requirements. Organizations can enable full environment lockdowns or open policy exceptions at the URL level, ensuring regulatory and business compliance.
Maximize ROI With Continued Secure Use of Legacy Applications
By utilizing Ion’s process isolation and settings management, IT security can effectively lock down the browser environment, minimizing potential attack vectors and maintaining a secure infrastructure. Ion enables IT security to accommodate certain situations where running insecure solutions becomes necessary for specific business requirements. With Ion, organizations can continue to run legacy systems safely, securely, and compatible with a modern browser – until they are ready to replace them.
Catalyst addresses the challenge of ensuring that users access web applications with the appropriate browser. IT specialists can create rulesets using Catalyst to control which browser opens each website based on URL, zones, or regular expressions. By automatically directing users to the right browser for specific applications, Catalyst reduces user frustration, minimizes human errors, and eliminates helpdesk calls and lost productivity caused by compatibility issues. Catalyst also provides the ability to isolate unsecured plugins by controlling which browser opens public websites.