Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Chrome Enterprise: How to Protect the Enterprise Browser Frontier
Cyber Security

Chrome Enterprise: How to Protect the Enterprise Browser Frontier

Team-CWDBy Team-CWDOctober 24, 2025No Comments9 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The browser is vital to organizations’ productivity, with critical tools like software-as-a-service (SaaS) and collaboration applications typically accessed via the browser.

However, the browser is now also a target for threat actors. Despite this, cybersecurity tools in many organizations have failed to properly evolve to meet this threat, with the primary focus still around endpoint security.

Infosecurity spoke to Dean Paterek, Chrome Enterprise Lead EMEA at Chrome Enterprise, to discuss this issue and to understand the security capabilities available for Google Chrome Enterprise, one of the most widely used browsers in the world.

Infosecurity Magazine: A recent Google Chrome whitepaper, “The Security Blindspot,” highlighted how traditional security models overlook the browser. What is this “blindspot” and why has the browser become the new critical, but often exposed, enterprise security perimeter?

Dean Paterek: Most organizations now realize, to a degree, that users are doing a lot of their work in the browser as they access more SaaS and web-based applications.

Traditional security has looked at endpoint and network security tools to govern that perimeter. These tools do a great job at protecting assets like managed devices and traffic that routes through a traditional network, when a user has accessed publicly facing applications or even privately hosted web apps. 

However, there’s a lot of activity that goes on within the browser that is not being picked up by traditional tools. Attackers realize that the easiest way to penetrate a business is to target the browser. 

Organizations are starting to recognize this threat and the need to have a level of visibility in the browser to be able to do something about it.

Security leaders need to start controlling what is happening in the browser, what users can do in the browser and then how you can enforce access control and data loss prevention control directly in the browser.

IM: Evasive tactics like QR code phishing and the use of legitimate browser features for living off the land attacks are on the rise. How is Chrome Enterprise Premium designed to counteract sophisticated, modern attacks that bypass traditional security tools?

DP: Chrome Enterprise Premium is a zero trust solution. A “never trust, always verify” approach. It looks at the user, the device, the location and never trusts any of those three until validated, so continuous authentication. 

If anything changes post-authentication, the connection will be cut. There’s never a continual level of trust applied in that environment.

We also protect users from downloading malicious content or going to phishing sites. Our consistent and dynamic URL risk evaluation looks to understand the behaviors of that URL, identify malicious activity and then apply a risk score internally. This enables us to either prevent a user going to those risky URLs or flagging them to notify that user that they are potentially at risk.

Should they go to that website, then we have a range of AI-powered phishing and malware protections which ensures we’re analyzing what is being downloaded from that website or URL in a dynamic way to understand what it is trying to do before it can execute on the system.

We can also add things like extension risk protection. We’re very aware that extensions are a key productivity tool within the browser, but they are being exploited. 

Chrome Enterprise can continually help organizations understand the changing nature of an extension after you have allowed a user to utilize an extension. 

We can build an automated removal of an extension which is causing issues or is exhibiting behavior changes. Alternatively, we can completely remove the user from the environment should that extension pose a risk.

IM: Insider threats and security risks associated with Bring Your Own Device (BYOD) policies present a major challenge. How does Chrome Enterprise address the data exfiltration and data loss prevention (DLP) challenge at the browser layer, particularly on unmanaged devices?

DP: This is one of the biggest areas where we’re seeing organizations move to a browser-based approach. Chrome Enterprise Premium uses rules that can prevent both malicious and unintentional data exfiltration.

We can prevent an attacker from targeting that organization and reduce the potential blast radius. Within the browser we can apply granular policy controls to prevent actions like download, upload, print, copy and paste. You can be specific to the user and tie that with context-aware access rules. Depending on where that user is, the device posture, the user privilege level, you can apply more granular DLP controls to enforce or reduce the level of restriction to that user.

We can also be preventative and help the user understand that they are accessing sensitive data and that they need to think about what they do with it. We can apply things like watermarks, preventing screenshots and screen sharing, or even mask certain parts of that web resource.

This can prevent the user from seeing parts of the data on the page unless they double click or completely hover over it. We can also completely redact the information depending on the signal from the device. 

Applying those DLP controls is based on a range of factors, and our view is that by bringing this directly to the user in the browser, you’re applying it at the most impactful point in that process.

IM: Security teams need actionable data to reduce the blind spot. What kind of telemetry, insights and reporting does Chrome Enterprise Premium generate, and how can security operations teams use this to enhance their Security Information and Event Management (SIEM) practices?

DP: Chrome Enterprise provides real time telemetry for network events, high-risk users and domains in a neat dashboard. This enables early visibility into what’s happening across the browser fleet, whether that’s on a managed or an unmanaged device. This can capture real evidence in the evidence locker. That can be used to support further forensic investigation.

What’s interesting now is the move from traditional device management, where you manage the device and integrate in an EDR tool, towards browser detection and response. This means that we’re now using the same methodology to detect and respond to threats but are not dependent upon having an EDR deployed.

The value of that is you’ve now got the same consistent control panel across managed and unmanaged devices. Security operations center (SOC) teams have not traditionally had that visibility into the extended workforce or vendor landscape in a consistent way. 

By integrating that into your security practice, you can start to apply a broader set of detection response capabilities across the environment. Within any third party SIEM you can build out those playbooks to identify user risk and potentially orchestrate a response within Google SecOps.

Within SecOps, we’re really starting to drive that automated detection and response directly in the browser.

IM: Finally, what is the business case and return on investment (ROI) for adopting Chrome Enterprise? How does it contribute to both risk reduction and employee productivity?

DP: We commissioned a report back in 2023 by Forrester, which calls out some specific stats regarding the ROI of the enterprise browser. 

It showed about a 10% reduction in overall security costs, equating to roughly $2.6m in savings from improved security and a saving of around $500,000 through improving IT resources and productivity.

That is the economics behind managing the browser when we think about utilizing it to get access to critical applications, to improve security and deliver threat protection directly at the user level. From there, ultimately reducing the attack blast radius by applying DLP controls. 

However, I think there is enormous value for organizations beyond this. There is a huge opportunity to consolidate and rationalize technology in the environment, so removing the need to deploy complex endpoint technologies or even buy devices in the first place. 

If you can start to remove the need to manage a device end to end, certainly for your extended workforce, then you remove the upfront cost in acquiring and provisioning said devices. 

And then you can reduce the in-life management cost and risk associated with managing those devices, just by handing out an identity and getting a user to sign into Chrome.

You can bring IT and security teams together and meet the IT requirement, which is providing scalable, efficient access to corporate resources quickly. At the same time, meeting the security requirement by providing a compliance audit for security-driven outcomes that allow the security team to understand what the user is accessing and restrict actions based on a whole range of controls. 

We’ve seen a huge amount of uptake from businesses looking to change the way they deliver secure access to both managed and unmanaged devices without the need for over-provisioning networks and deploying complex endpoint, network infrastructure.

IM: Given the threats and solutions we’ve discussed, what steps can an IT security leader take to begin addressing the browser security blind spot in their organization?

DP: Phase one is to simply gain control and visibility of how the browser is being used.

Without understanding what’s happening, it’s difficult to do anything about it. Within Chrome today you can manage the Chrome browser across your environment, both on managed and non-managed devices through Chrome Enterprise Core.

This is a capability to apply basic policy control and govern extensions directly across your environment today, then look at how you can operationalize the power of the browser and start using it as an access control method and applying the granular DLP control.

There’s a range of benefits that can be delivered directly via a control, which is deployed on over four billion devices out there today. 

It’s a significant opportunity for organizations to mobilize what is a very common platform as both a productivity and security tool.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew LockBit Ransomware Victims Identified by Security Researchers
Next Article F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

AI-powered financial scams swamp social media

September 11, 2025

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.