Table of Contents
- Executive Summary
- Deployment Types
- Decision Criteria Comparison
- GigaOm Radar
- Solution Insights
- Analyst’s Outlook
- Methodology
- About Andrew Green
- About GigaOm
- Copyright
1. Executive Summary
Secure enterprise browsing solutions enable users to access websites and web-based resources in compliance with corporate security policies and provide security modules to protect them against cyberattacks.
These solutions sit at the intersection of user, device, and web resources to ensure secure access and enforce security policies. This position at the crossroads enables the secure browsing solution to apply multiple types of functions:
- Protecting end users from malicious web resources
- Protecting enterprises from malicious insiders
- Protecting enterprises from negligent users
- Protecting enterprises from compromised accounts
Protecting end users from malicious web resources comes in two flavors. First, the adversary can be highly technical malware attacks causing websites to execute malicious scripts or download and run malware. Second, it can be social engineering attacks that encourage users to willingly but unknowingly compromise their identities.
To achieve these protection functions, secure enterprise browsing solutions must employ different security techniques, such as endpoint protection for local detection and response to threats, network protection for securing inbound and outbound requests, and identity and access management for alignment with company-wide authentication and authorization.
Protecting enterprises from malicious insiders or compromised account attacks means that the solution can enforce zero-trust policies, detect suspicious behavior, regulate access permissions depending on risk factors, and enforce data loss prevention (DLP).
With the browser as the most commonly used application throughout the workforce and the gateway to internal and external resources, companies have the opportunity to significantly improve their security posture across the whole organization, tackling some of the most prominent and damaging types of cyberattacks of today.
This is our first time evaluating the secure enterprise browsing space in the context of our Key Criteria and Radar reports. This GigaOm Radar report examines 13 of the top secure enterprise browsing solutions and compares offerings against the capabilities (table stakes, key features, and emerging features) and nonfunctional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading secure enterprise browsing offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision.
GIGAOM KEY CRITERIA AND RADAR REPORTS
The GigaOm Key Criteria report provides a detailed decision framework for IT and executive leadership assessing enterprise technologies. Each report defines relevant functional and nonfunctional aspects of solutions in a sector. The Key Criteria report informs the GigaOm Radar report, which provides a forward-looking assessment of vendor solutions in the sector.