One Article Review

Accueil - L'article:
Source GoogleSec.webp GoogleSec
Identifiant 8347380
Date de publication 2023-06-20 11:58:57 (vue: 2023-06-20 17:06:35)
Titre Protégez et gérez les extensions du navigateur à l'aide de la gestion du cloud Chrome Browser
Protect and manage browser extensions using Chrome Browser Cloud Management
Texte Posted by Anuj Goyal, Product Manager, Chrome Browser Browser extensions, while offering valuable functionalities, can seem risky to organizations. One major concern is the potential for security vulnerabilities. Poorly designed or malicious extensions could compromise data integrity and expose sensitive information to unauthorized access. Moreover, certain extensions may introduce performance issues or conflicts with other software, leading to system instability. Therefore, many organizations find it crucial to have visibility into the usage of extensions and the ability to control them. Chrome browser offers these extension management capabilities and reporting via Chrome Browser Cloud Management. In this blog post, we will walk you through how to utilize these features to keep your data and users safe. Visibility into Extensions being used in your environment Having visibility into what and how extensions are being used enables IT and security teams to assess potential security implications, ensure compliance with organizational policies, and mitigate potential risks. There are three ways you can get critical information about extensions in your organization:1. App and extension usage reportingOrganizations can gain visibility into every Chrome extension that is installed across an enterprise\'s fleet in Chrome App and Extension Usage Reporting.2. Extension Risk AssessmentCRXcavator and Spin.AI Risk Assessment are tools used to assess the risks of browser extensions and minimize the risks associated with them. We are making extension scores via these two platforms available directly in Chrome Browser Cloud Management, so security teams can have an at-a-glance view of risk scores of the extensions being used in their browser environment. 3. Extension event reportingExtension installs events are now available to alert IT and security teams of new extension usage in their environment.Organizations can send critical browser security events to their chosen solution providers, such as Splunk, Crowdstrike, Palo Alto Networks, and Google solutions, including Chronicle, Cloud PubSub, and Google Workspace, for further analysis. You can also view the event logs directly in Chrome Browser Cloud Management.
Envoyé Oui
Condensat  app  extension  force ability about access across added additional admin admins advantage alert all allow allows already also alto analysis anuj any app approach approvals approve apps are asked assess assessment assessmentcrxcavator associated automatically available based before being beyond block blog browser browsers browsing business but can capabilities certain changes check chosen chrome chronicle cloud committed compliance compromise concern conflicts control controls cost could critical crowdstrike crucial data decide demo demos deny designed device digital directly documenting either enables end enforce ensure enterprise enterprises environment evaluate event events every example experts explicitly expose extension extensions extensions:1 extensionsin features find fleet force frequently from functionalities further gain get gives glance google goyal great group have haven having help helpful how huge implications including information infrastructure instability install install/block installed installing installs integrity introduce issues justification keep known leading location logs maintain major making malicious manage managed management manager managing many may might minimize mitigate more moreover most networks new newly not now offering offers one organization:1 organizational organizations other out over overall palo performance permission permissionorganizations permissions pin pinned pinningadmins platforms play policies poorly post posted potential prevent product productivity prompt protect providers pubsub questions recently released reporting reportingextension reportingorganizations request requested requesting requests result review risk risks risky role safe safeguard say scores secure securely security see seem select send sensitive series set several share shows sign software solution solutions some specific speed spin splunk stable start such system tab take teams them therefore these three through tools two unauthorized unit unless upgraded usage use used user users using utilize valuable version versions view visibility vulnerabilities walk want wants ways what where whether why will workflow workflowextension workforce workspace you your
Tags Cloud
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: