Feeds

'IE hit squad' helps ease browser babel on office PCs

Used to be all (Microsoft green) fields round here

High performance access to file storage

A browser start-up is building software to help large operations manage the increasing breakdown in dominance of Microsoft’s Internet Explorer and the proliferation of various other browsers in the workplace.

Internet Explorer hit squad Browsium has announced beta availability of Catalyst, software that manages the creeping penetration of Firefox and Chrome onto work PCs and devices.

Catalyst allows organisations to run Firefox and Chrome on enterprise machines - in addition to IE - without exposing important applications and machines to attack from the web, and without the additional cost of training and supporting end-users.

Catalyst works by directing the browser that the end user is running to the “right” application or website. The “right” app or site is defined in the Catalyst configuration manager; you set the default browser for a given type of traffic, with Catalyst executing the rules.

Catalyst is due in the first quarter of 2013 for Windows XP SP3 (32-bit), Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), IE 6, 7, 8 and 9, Chrome 22 or later, Firefox 15 or later and .NET Framework Version 3.5 or later.

It comes as IE continues its slide south: from near-total market saturation in the 2000s, Microsoft's browser is now at 32 per cent share according to StatCounter, and is the number-two browser behind Chrome on 34 per cent. Firefox is on 22 per cent. Microsoft’s slide comes despite the much-hyped releases of IE8 and IE9 in recent years, to refresh the franchise.

Browsium president and chief operating officer Gary Schare told The Reg that Catalyst straddles the growing fragmentation. “Catalyst lets you view different sites and view them with different browsers, so you don’t have to have all sites work in one browser,” he said.

To get around this so far, Schare reckoned organisations have been putting in manual places to support mixed browser environments but that these end up costing time and money because they don’t work.

His company, formed by ex-Microsoft-Windows team members who'd built early versions of IE, has to-date been heavily engaged with major operations on managing IE6. One of his biggest customers in the UK is HM Revenue & Customs, shifting 85,000 PCs running Windows XP and IE6 to Windows 7 and IE8.

Through his engagements, Share said he has found organisations using training to get around the cross-platform issue: telling users the sites they can access on a browser-by-browser basis but, he says, this breaks down and people end up calling the support desk.

This happens because Firefox and Chrome don’t support Microsoft’s ActiveX controls, so sites optimised for Microsoft’s browser won’t render the same way in Firefox or Chrome – they will appear broken, and would need to be tweaked by IT.

In another scenario, organisations can get left open to attack: for example, companies are telling staff not to use IE6 for the web, but IE6 users do end up slipping online. IE6 continues to cling on inside many large government and business operations, which are tied to the browser through their use of Windows XP. But IE6 online poses a major security problem - with even Microsoft campaigning for users to move to IE8 and IE9 in order to stay safe from phishing and malware.

“Catalyst is a way of avoiding help-desk calls and avoiding security crises,” Share said.

Google, too, has helped complicate things: Google in 2009 released a plug in for IE called Chrome Frame that gave IE the Chrome rendering and JavaScript engines. The idea was to display web content in Microsoft’s then-standards-challenged browser that had not been built for things like ActiveX controls.

Browsium in August here noted Chrome Frame poses a major security risk; it is invoked through a meta tag but there’s no way to lock it down to a specific site. That means there’s no way to prevent any site on the internet from invoking the application that the user wants to run in Chrome.

You can register for the Catalyst beta here. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.