CyberArk, a leading identity security vendor, has announced the creation of its newly-designed enterprise browser, the CyberArk Secure Browser. It is set to launch at the end of 2023 as a critical component of CyberArk’s Identity Security Platform. The development reflects the company’s efforts to respond to trends affecting hybrid work environments, as well as its own research that has discovered an increase in post-multifactor authentication (MFA) attacks that target session cookies. In response, CyberArk chose to build a new enterprise browser, with an identity-first, security-first approach, for its business, said Gil Rapaport, GM Access at CyberArk.
The CyberArk Secure Browser is based on the open-source browser project Chromium and supports zero trust via integrated security, centralized policy management, and productivity tools. Its status as part of CyberArk’s Identity Security Platform means that IT managers can tailor security, productivity, and privacy controls on both managed and unmanaged devices. IT teams will also be delighted that the new browser will dynamically reflect controls and access policies used on devices that end-users already have, such as Chrome and Edge. This feature will significantly reduce IT overhead costs and speed up deployments, according to CyberArk.
The CyberArk Secure Browser has several critical features that differentiate it from competitors. One such feature is cookieless browsing, which enables users to access web-based resources without exposing or saving a static cookie file on their devices. This approach makes it difficult for illegal third-party users to steal, forge, alter, or manipulate cookies to gain unauthorized access to sensitive resources. In addition, this technology helps ensure users’ web sessions, data, and accounts are safe and confidential.
Another unique CyberArk Secure Browser feature is data exfiltration protection. It offers fine-grained policies to prevent data exfiltration attempts that can compromise corporate data. Similarly, the new browser will offer password replacement, where a one-time alphanumeric string displays instead of stored credentials for privileged resources or websites. This string works only once and is only visible in the CyberArk Secure Browser, ensuring users never see privileged credentials in plain text.
CyberArk Secure Browser will work with third-party identity providers and CyberArk Identity Security Platform solutions to ensure seamless integration between them. This includes the vendor’s Workforce Password Management and Secure Web Sessions. Customers can customize session protections, access controls, and credential management to each user based on their roles. It also works with CyberArk Endpoint Privilege Manager to counter potentially risky web access and vulnerable endpoints.
There are various secure enterprise browsers available in the market, apart from CyberArk Secure Browser. Chrome Browser is one such browser that has both built-in and added controls. They include preventing malware, isolating malicious web pages, quick fixes for zero-day vulnerabilities, and setting up extension permissions and policies. Talon’s enterprise browser offers a full picture of browser activity, session recordings for forensic investigations and compliance, malware and phishing protection, and integration with SIEM and XDR platforms, among other features. Others, such as LayerX, offer a browser security platform delivered as a browser extension that can extend zero trust approaches to the browser and protect unmanaged devices, amongst other features.
In conclusion, the CyberArk Secure Browser is an innovative solution designed for IT professionals, who want to ensure their hybrid work environments are secure. It is based on trends impacting such environments and tackles the issues of post-multi-factor attacks while providing ease of deployment and integration with other Identity Security Platform solutions. CyberArk Secure Browser will likely compete favourably with other secure enterprise browsers, offering bespoke features that address specific security challenges.