Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages...

5
| All the Web Without the Risk ©2015 Ntrepid Corporation. All rights reserved. GetPassages.com Page 1 of 5 Passages by Ntrepid Competitor Comparison | All the Web Without the Risk What to look for in a secure browser There is a growing realization that conventional browsers are irreparably insecure. While several companies are starting to offer virtual browsing solutions, all secure browsers are not created equal. Some force users to make unacceptable sacrifices in performance or usability for the sake of security, or sacrifices in security for performance. There are five key capabilities you need to examine when comparing secure browser solutions. Only Passages completely addresses all of these requirements. MANAGEMENT AND REPORTING PREVENTION OF TARGETED ATTACKS ISOLATION FROM THE LOCAL COMPUTER ISOLATION FROM THE LOCAL NETWORK FUNCTIONALITY AND EASE OF USE

Transcript of Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages...

Page 1: Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages brings the full browsing experience to your desktop without putting your desktop

| All the Web Without the Risk

©2015 Ntrepid Corporation. All rights reserved.GetPassages.com

Page 1 of 5

Passages by Ntrepid Competitor Comparison

| All the Web Without the Risk

What to look for in a secure browser

There is a growing realization that conventional browsers are irreparably insecure. While several companies are starting to offer virtual browsing solutions, all secure browsers are

not created equal. Some force users to make unacceptable sacrifices in performance or usability for the sake of security, or sacrifices in security for performance.

There are five key capabilities you need to examine when comparing secure browser solutions. Only Passages completely addresses all of these requirements.

MANAGEMENT AND REPORTING

PREVENTION OF TARGETED ATTACKS

ISOLATION FROM THE LOCAL COMPUTER

ISOLATION FROM THE LOCAL NETWORK

FUNCTIONALITY AND EASE OF USE

Page 2: Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages brings the full browsing experience to your desktop without putting your desktop

| All the Web Without the Risk

©2015 Ntrepid Corporation. All rights reserved.GetPassages.com

Page 2 of 5

Over 15 Years Industry Experience

Identity Control and Non-Attribution

Intuitive, Full-featured Browser (Bookmarks,

Preferences, Plug-ins)

Secure Downloads

Hosted & On-premise Deployments

Complete Web Experience (Audio, Video, Flash, Java)

Built-in Network Isolation

Document Isolation

Email Phishing Link Protection

Full User Activity Auditing

Cross Platform Support for Windows

& Mac

Utilizes Linux VM

Virtualization

*This information and all of its contents are strictly confidential and may only be shared with the intended individuals.

Competitive OverviewLast updated February 2016

Page 3: Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages brings the full browsing experience to your desktop without putting your desktop

| All the Web Without the Risk

©2015 Ntrepid Corporation. All rights reserved.GetPassages.com

Page 3 of 5

of the system. Isolating multiple applications — to include the browser — creates a system so complex that it’s difficult to deploy and a nightmare to maintain. Remote solutions require strong and consistent network connections to prevent crippling the user experience, and often fail to deliver anything close to native performance. Remote solutions that maintain user information on a persisted VM only lead to targeted web attacks or persistent undetected malware.

Passages packages a lightweight, hardened Linux-based VM with the application that runs locally on your desktop. This ensures optimal performance and a near-native browsing experience with unequaled ease-of-use, while completely isolating the browser from the local machine. Additionally, the attack surface is greatly reduced through our proprietary hardening techniques. And, because it is running on Linux, there are virtually zero attacks against the VM.

To take it one step further, Passages provides uniquely powerful network isolation, preventing horizontal attacks within the enterprise. We ensure security by only allowing network communications to flow over the VPN connection to our secure cloud.

Lastly, Passages rebuilds the VM at the start of every session, creating a new virtual environment every time, while maintaining your browsing history, bookmarks, plugins, and downloads in the cloud. Passages brings the full browsing experience to your desktop without putting your desktop at risk.

Identity ControlPassages is the only solution providing advanced network and identity isolation. While other solutions expose their customers’ network infrastructure and

Securing your users’ web browsing experience is essential to protecting your company’s assets and brand. However, many secure browsers fall short. From a high level, the solutions may look the same until you drill into their functionality. When you do, it’s easy to see why Passages comes out on top. For a full-featured secure browser with best-of-breed security capabilities, security-minded companies continue to choose Passages.

Industry ExperienceNtrepid has more than 15 years of experience protecting the National Security Community from the

world’s most sophisticated opponents. Our full suite of products offers advanced solutions for cyber security, open source research, web

scraping, tracking, translation, and analysis. You can find out more about our products and history at NtrepidCorp.com.

Virtualization/IsolationThere are several approaches to virtualizing, or isolating, the browser. Some solutions use a hypervisor or “micro-VM” to wrap the browser — even distinct tabs — in separate virtual environments. Others use a “secure virtual container” or sandboxed application to execute untrusted tasks relying on behavior-based techniques. Then there are solutions that virtualize the browser remotely on servers or limit the browser to only whitelisted sites — controlling where, when, and how users access the Internet.

Many solutions are built on a flawed security architecture. Sandboxes are full of holes, and can’t provide the same protection that a full virtual machine (VM) can. Or the VM is based on a Windows environment, which is by far the most exploited platform. Plus, several VMs running simultaneously on a desktop computer place massive strains on system resources and severely impact the overall performance

Ntrepid has more than 15 years of

experience

Passages packages a lightweight, hardened Linux-based VM with the application that runs locally on your desktop.

Passages provides uniquely powerful network isolation

Page 4: Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages brings the full browsing experience to your desktop without putting your desktop

| All the Web Without the Risk

©2015 Ntrepid Corporation. All rights reserved.GetPassages.com

Page 4 of 5

addition, Passages manages all integrated plug-ins and browser versions, keeping every component up-to-date so your employees don’t have to. Passages was designed to free your users, giving them unrestricted access to full-featured web content while providing administrative policy control options to ensure corporate requirements continue to be met.

ManagementMany solutions claim to provide advanced threat analytics, data forensics, and incident response capabilities. However, these tools fall short when it comes to supporting large enterprise needs. Enterprises often already have advanced analytic suites and their own installed security appliances — what they need is a product that works with investments they’ve already made in security architecture, not another stand-alone solution. Deployments, user management, and audits need to be controlled in a way that is simple, effective, and easily integrated with existing solutions.

That’s why Passages includes Insight, a comprehensive management suite for full audits of user activity including browser and download history, IP usage, and time online. By collecting user information in the browser, Insight can capture web traffic before it’s encrypted for an unprecedented vantage into user behavior. The Insight dashboard allows administrators to customize, manage, and grow their deployment with ease. Additionally, Insight can be configured to provide raw data and syslog reports directly to corporate monitoring tools or SIEM platforms — allowing businesses to leverage and take advantage of existing investments.

digital footprint to would-be attackers, Passages uses a Virtual Private Network (VPN) combined with routing and firewall rules within the VM to completely isolate the VM and the browser from the local network. Passages’ unique network of points of presence, powered by our patented Identity Control technology, provides identity protection, prevents targeting, and allows users to change their apparent location. Passages’ advanced identity protection and non-attribution tools are the first line of defense against targeted web attacks and passive information leakage.

Full-featured Web Browsing Experience

Some solutions limit the browser experience by only allowing trusted files or websites to be accessed. Others provide a limited browser experience that doesn’t include support for audio and video playback, can’t display Flash or Java content, and struggles with HTML5. Some product architectures are inherently limiting, and struggle to provide a quality user experience, especially for streaming video and audio

content. They also further diminish the user experience by not maintaining browser history, bookmarks, file downloads or add-ons and plug-ins between sessions.

Passages offers security without restrictions, providing your users with an intuitive web browsing experience that doesn’t place enterprise resources at risk. With

Passages, browser history, bookmarks, downloads and add-ons are stored in the secure Passages cloud, giving users access to their content in a format they understand without exposing them to additional risk. By running the Passages browser in a locally hosted VM, users can stream audio and video with ease, access Flash and Java content and use browser add-ons and extensions they’ve come to know and love. In

By running the Passages browser in a locally hosted VM,

users can stream audio and video with

ease, access Flash and Java content and

use browser add-ons and extensions

they’ve come to know and love.

Insight is a comprehensive management suite for full audits of user activity including browser and download history, IP usage, and time online

Page 5: Passages by Ntrepid Competitor Comparison...bookmarks, plugins, and downloads in the cloud. Passages brings the full browsing experience to your desktop without putting your desktop

| All the Web Without the Risk

©2015 Ntrepid Corporation. All rights reserved.GetPassages.com

Page 5 of 5

Cost/PricingWith other solutions, you’ll need to keep an eye out for hidden costs. Training, installation, and continued support can have creeping costs in addition to dragging out deployments and preventing the security your employees desperately need.

Passages’ subscription-based pricing includes critical updates and support, ensuring that your organization remains secure with all the latest security patches. As a hosted solution, Passages keeps deployment costs minimal and doesn’t require customers to install additional hardware for management or analytics. The desktop application can be downloaded and installed by the end user or pushed through a local group policy object (GPO) or image.

Passages is built to look, feel, and act like a normal browser, getting your users online and browsing quickly. Passages provides an out-of-the-box hosted solution for all your enterprise needs — no complications, no extra charges, no hidden fees. In addition to our standard deployment options, Passages is a flexible platform that can be customized to suit the needs of any organization.

Secure DownloadsSome solutions simply restrict file downloads altogether, but the web is only useful if you can interact with it. Other solutions provide admins with the ability to enable file download, but they don’t offer any safeguards against malware or drive-by downloads.

Safehold allows Passages users to securely transfer files to and from their local machine. Files from the web are downloaded to Safehold — our cloud-based

storage system — and scanned for malicious content. We use well tested scanners like ESET and Clam AV as well as next generation tools like Cylance. If an infection is found, the

file is immediately quarantined and administrators are alerted. Users can transfer safe content to and from their desktop, allowing them to upload pictures, pull data from sites, save .pdf files for later viewing, or open content they can’t view in the browser on their local machine. Additionally users can view .pdf and Microsoft Office documents entirely within Passages, removing the need to download these files at all in most cases.

Files from the web are downloaded to

Safehold — our cloud-based storage system

— and scanned for malicious content.

US Patent 8,375,434 B2 System For Protecting Identity In a Network Environment — allows users to securely browse online by masking their true location and other identifying information.

03-16-003

Contact us at: [email protected] or 800.921.2414 | Online at: GetPassages.com

All the Web Without the RiskGetPassages.com