• Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
SUBSCRIBE
Smart Solutions World
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
No Result
View All Result
Home Solutions News world

25% of Organizations Will Use Secure Enterprise Browsers to Enhance Remote Access and Endpoint Security by 2028

SmartSolutionUser1 by SmartSolutionUser1
April 30, 2025
in Solutions News world
0
$20B in Cybersecurity Sales Through Channel Partners In Q4 2024: Canalys
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

By 2028, 25% of organizations will augment existing secure remote access and endpoint security tools by deploying at least one secure enterprise browser (SEB) technology to address specific gaps, according to Gartner.

You might also like

STL expands Data Centre portfolio to meet emerging requirements for AI data centres

Kyndryl report: Why most businesses are not yet winning with AI

HPE Unveils New Switches and Network Upgrades for AI and HPC Demands

Threat actors frequently target employees with phishing attacks to steal credentials and bypass endpoint detection and response controls, necessitating an additional layer of visibility and control within the web browser.

“Web browsers are the primary access method for most modern corporate applications and provide an endpoint-agnostic enterprise security control point,” said Max Taggett, Sr Principal Analyst at Gartner. “Security leaders can use a SEB to reduce risk and improve the digital experience.”

Currently, Gartner estimates that less than 10% of organizations have adopted a SEB. Organizations that primarily rely on SaaS applications, with minimal branch locations or cyber physical systems to secure, need a simpler method of managing security technology than traditional security stacks. SEBs fulfill that need.

In addition, SEBs enable segmented access from unmanaged or lightly managed end-user devices and bring-your-own PC, where deploying endpoint agents would be inappropriate due to privacy or maintenance reasons.

“SEBs embed enterprise security controls into the native web browsing experience using a customized browser or extension for existing browsers, instead of adding bolt-on controls at the endpoint or network layer,” said Evgeny Mirolyubov, Sr Director Analyst at Gartner. “SEBs also enable segmented access to SaaS applications tunneled directly from web browsers, minimizing the need for full endpoint agents and tunnels.”

Organizations deploying SEBs can:

  • Enforce enterprise security policies and gain web traffic visibility without requiring in-line decryption, potentially improving application performance and latency.
  • Support the transition from legacy client applications to modern SaaS application delivery.
  • Complement or reduce reliance on VPNs and VDIs, and desktop as a service for organizations prioritizing remote or third-party work and cloud delivery.
  • Augment antiphishing and credential theft protection capabilities, such as protection against reuse of corporate credentials on unauthorized or phishing websites, on devices where browser usage is restricted to selected SEBs.
  • Enhance visibility and reporting of web application usage, performance and employee behavioral analytics for lightly managed or unmanaged devices, and for organizations without a mature DEX strategy.
Tags: BrowserGartner
Share30Tweet19
SmartSolutionUser1

SmartSolutionUser1

Recommended For You

STL expands Data Centre portfolio to meet emerging requirements for AI data centres

by SmartSolutionUser1
June 16, 2025
0
STL expands Data Centre portfolio to meet emerging requirements for AI data centres

STL, a leading optical and digital solutions company, announced the launch of a new generation of Data Centre solutions, rangingfrom cabling to end-to-end connectivity offerings designed to power the...

Read moreDetails

Kyndryl report: Why most businesses are not yet winning with AI

by SmartSolutionUser1
May 30, 2025
0
Kyndryl report: Why most businesses are not yet winning with AI

A new global study released by Kyndryl found that only a small number of organisations have taken steps to align their workforce strategies with the growth of AI...

Read moreDetails

HPE Unveils New Switches and Network Upgrades for AI and HPC Demands

by SmartSolutionUser1
May 30, 2025
0
HPE VM Essentials Now Available Globally Through Channel Partners

 Hewlett Packard Enterprise has announced expansions of its HPE Aruba Networking wired and wireless portfolio, along with new HPE Aruba Networking CX 10K distributed services switches, which feature built-in programmable data processing...

Read moreDetails

New Relic Unveils Integration with the GitHub Copilot Coding Agent to Accelerate Innovation and Automate Reliability

by SmartSolutionUser1
May 30, 2025
0
New Relic eAPM Provides Complete Visibility Into Kubernetes Workloads

New Relic has announced an integration of its AI-strengthened technology with the latest agentic capability of GitHub Copilot called coding agent. The powerful integration transforms the traditional, manual...

Read moreDetails

Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’

by SmartSolutionUser1
May 26, 2025
0
Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’

Quick Heal Technologies Limited a global cybersecurity solutions provider, through its Seqrite Labs, India’s largest malware analysis facility, has revealed some critical details about coordinated cyberattacks exploiting geopolitical tensions during ‘Operation...

Read moreDetails
Next Post
World Password Day: Sophos Calls For the End of the Password

World Password Day: Sophos Calls For the End of the Password

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Red Hat OpenShift Virtualization Engine Now Available

Red Hat Introduces Kubernetes-Native Connectivity Management with Red Hat Connectivity Link

January 20, 2025
GESS Dubai 2024 to spotlight EdTech 

GESS Dubai 2024 to spotlight EdTech 

September 6, 2024
McAfee Brings Deepfake Detector To HP Copilot+ PCs

McAfee Brings Deepfake Detector To HP Copilot+ PCs

January 6, 2025

Browse by Category

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized
Smart Solutions World

We bring you the best Premium news, magazine, personal blog, etc. Check our landing page for details.

CATEGORIES

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized

BROWSE BY TAG

Accenture Acquisition Acronis Adobe Agentic AI AI AMD Atlassian AWS Barracuda Networks Canalys Cisco Cloud Cloudflare CrowdStrike CyberArk Databricks Gartner GenAI Google Cloud HID HPE IBM InfoComm India 2024 Infosys Kaspersky KnowBe4 Kramer Lenovo NETGEAR New Relic NTT DATA Nutanix Nvidia Oracle Palo Alto Networks Proofpoint Qlik Salesforce ServiceNow Sify Sophos Tenable Verizon Zoom

© 2024 NCN - Premium news & magazine by NCN.

No Result
View All Result
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions

© 2024 NCN - Premium news & magazine by NCN.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?