Protect On Q Introduction

Protect On Q enables web sites to mitigate information compromise risks introducedby web browsers, and by extension end users. Browsers have become the target or vector of many styles of attacks. While SSL protected packets (i.e., HTTPS) and data center security solutions (e.g., web application firewalls) can significantly increase protections against compromise, the end point has become the relative weak link in this three link chain. Reasons include:

Protect On Q takes a fundamentally different approach to solve the problem of browser insecurity. Instead of relying on end users to ensure their access device is in a strong security state, web sites deploying Protect On Q can take control of mitigating the risk by quickly delivering an on demand security layer around the browser instances that connect to their site. This layer is controlled by the web site administrator via a site specific policy. It requires no extraordinary requirements of the end user or local system and does not require IT staff to install software, minimizing operational overhead and desktop support complexity.

* Breadth and depth of attacks:

The monetization of malware has increased the number and sophistication of attacks. Vulnerabilities, both in browser code as well as plug-ins, along with new methods of social engineering have increased dramatically.


* Decreased efficacy of traditional anti-virus solutions:

Many recent studies1 have shown that the growth in the number of in-the-wild attacks has decreased the detection rate of anti-malware solutions, increasing the vulnerability window for users.


* Increase in data at risk:

More and more organizations are making sensitive content available via a browser across the Internet, whether enterprise content such as product design documents, customer account databases, and internal communications like email. or customer-focused content like account login credentials, banking transactions and health care information. Underground markets for resale of stolen data create a financial motivation for cybercriminals as well as malicious insiders.


* Inability to address end user threats:

While much attention is focused on the malware threats to web applications, users operating the browsers are another significant risk vector. High value data, once decrypted and rendered in browsers, is at risk of being compromised by the actions of malicious or careless end users. For example, running a CRM report and saving a local copy of an organization’s sales pipeline.


* Lack of visibility:

Browser vendors have done a credible job of adding security features to their products in an attempt to mitigate the browsers’ vulnerabilities. However, high assurance web sites have little or no way of knowing if users have enabled such features, or have configured them correctly.