Feeds

The Register Guide on how to stay anonymous (part 3)

Browser privacy at work

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Changing up the internet

Microsoft's utter dominance of the browser market in the early 2000's fed a corporate hubris that resulted in software stagnation. Corporations wanted a stable platform to develop against, and for the longest time Microsoft felt IE6 was "good enough." The real world is no longer so clean and simple.

There are solid business cases for the use of alternate browsers. Microsoft makes an excellent mass market browser, but the lack of a browser extension community has harmed its ability to reach out to the growing number of users who need their browser to do something different.

THE_BROWSER_SHEEP

Firefox's plug-in library is unmatched. Many of these plug-ins offer time-saving productivity enhancements simply unavailable to IE users. Google's Chrome holds the speed crown for most common workloads. In an increasingly JavaScript-enabled cloud computing world, Chrome's raw speed provides a significant advantage over Internet Explorer. Some businesses even find uses for Safari or Opera.

Plug it in, baby (click to enlarge)

Chrome in particular is starting to see rapid enterprise uptake. Chrome officially supports many enterprise features, including Active Directory GPOs. This brings Chrome within reach of IE's manageability.

More importantly, Chrome offers the ability to whitelist, blacklist, and force installation of extensions. This includes the ability to host extensions on your own server.

Though Chrome's enterprise configurability is second only to IEs, this enterprise functionality does have its drawbacks.

While not officially supported by Mozilla, there are third parties attempting to make Firefox deployable in an enterprise fashion. While a significant first step, these projects are either abandoned, nascent, or lacking in critical granularity regarding browser extension configurability. Efforts are ongoing, supported by a determined user base.

Neither Apple's Safari team nor Opera seem particularly interested in extending enterprise functionality to their browsers. This last is a shame; the emerging importance of non-Microsoft platforms - especially mobility - makes cross-platform browsing more important than ever.

We are far from the Utopian dream where coding a website to standards results in software that will work across all browsers and platforms. All browsers have quirks. Not all businesses can afford the developer time and expertise required to support all iterations of all browsers. Businesses - especially when coding complex internal-use sites - require a stable target to code for.

Internet Security Threat Report 2014

Next page: The iPhone Effect

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.