Attack Surface Management , Cloud Security , Security Operations

Securing the Enterprise Browser

Menlo Security's Ben-Efraim on Enhancing Existing Browsers With Additional Security
Amir Ben-Efraim, CEO, Menlo Security

An enterprise browser offers control over browsing sessions and capabilities for enhanced security and connectivity, but enterprises need to disable browser synchronization to prevent security breaches, such as the inadvertent propagation of enterprise passwords, according to Amir Ben-Efraim, CEO, Menlo Security.

The vulnerability of browsers such as Chrome often stems from their complexity and frequent updates, Amir said, and with "millions of lines of code changing frequently, it leaves a lot of holes behind for adversaries."

"Choose your browsing footprint. The most common ones that we see in our customer base are Edge from Microsoft and Chrome from Google," Amir said. "How do you complement these existing browsers with the manageability and security frameworks and achieve a better outcome from an enterprise perspective and not replacing them?"

In this video interview with Information Security Media Group at RSA Conference 2024, Ben-Efraim also discussed:

  • The contributions of tech giants such as Google and Microsoft to enhance enterprise browser security features;
  • How Menlo Security uses cloud browser to mitigate local security risks;
  • How Menlo Security uses AI to detect and prevent phishing and impersonation attempts.

Ben-Efraim co-founded Menlo Security in 2013 to pioneer a new approach. He was vice president of cloud security at Juniper Networks, where he helped define company strategy for securing the virtualized data center as well as public and private clouds. He joined Juniper through its 2011 acquisition of Altor Networks, where he was founder and CEO. Before that, he was an executive at internet security pioneer Check Point Software from 2004 to 2007.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.