The Secure Browser uses virtualization technology to provide a safer web experience to users and organizations. When using the Secure Browser any changes or malicious files inadvertently downloaded from the Internet are contained within the secure browser, keeping the underlying OS and computer secure from hostile changes. Any changes resulting from browser activity may be quickly and easily reset to effectively Â“undoÂ” such changes and return it to its initially installed state. This makes it much easier to clean a system and bring the user back to full productivity. Secure Browsers also offer the option of specifying Â“whiteÂ” and Â“blackÂ” lists to control what processes may be started or what sites may be visited. Limiting browser use to specific sites can control usage and protect from cross site scripting attacks. By specifying which sites are to be blocked, it makes it easy to keep users away from known bad sites, and thereby limit their exposure to attacks. In controlling what processes may be started, the browser will not run programs or plug-ins without permission to do so, which allows for the prevention of many attacks before they can even be initiated.
Secure Browser - Dell KACE
07/20/2010 12645 views