For those familiar with "Enterprise Browsers" or "Secure Web Browsers" can you share what you use? Also curious to hear people's experiences with the chosen technology in the comments if possible.

island.io17%

Surf Security36%

Talon Cybersecurity24%

Layer X10%

Other?13%

94 PARTICIPANTS
7.3k viewscircle icon2 Comments
Sort by:
CISO in Governmenta year ago

Looking at Push Security in this space as well. Seems to have the same approach as LayerX. 

IT Manager2 years ago

Thanks for the feedback everyone keep it coming!

Content you might like

Network Detection and Response (NDR)24%

Endpoint Detection and Response (EDR)41%

Extended Detection and Response (xDR = NDR / EDR / CDR)69%

Intrusion Detection & Prevention Systems (TLS Decrypting) IDPS27%

Deception Technology (External Only)11%

Deception Technology (Internal Only)7%

Deception Technology (External & Internal)9%

View Results

For user awareness: We use visible markings to ensure users are constantly reminded of the document's sensitivity.50%

To avoid distracting users: We use no visible markings to prevent headers and watermarks from interfering with readability and collaboration.

To simplify the labeling process: We use a standardized approach to minimize user confusion and streamline adoption.25%

Compliance or policy requirement: Our choice is dictated by specific regulatory or internal compliance mandates.25%

Other: Our reason is not listed above.25%

My organization does not utilize sensitivity labels.25%

My organization does not use the internal nor public sensitive labels.25%

My organization is a public organization (state or federal).25%

View Results
For those familiar with 'Enterprise Browsers' or 'Secure Web Browsers' can you share what you use? Also curious to hear people's experiences with the chosen technology in the comments if possible. | Gartner Peer Community