For those familiar with "Enterprise Browsers" or "Secure Web Browsers" can you share what you use? Also curious to hear people's experiences with the chosen technology in the comments if possible.

island.io17%

Surf Security36%

Talon Cybersecurity24%

Layer X10%

Other?13%

94 PARTICIPANTS
7.3k viewscircle icon2 Comments
Sort by:
CISO in Governmenta year ago

Looking at Push Security in this space as well. Seems to have the same approach as LayerX. 

IT Manager2 years ago

Thanks for the feedback everyone keep it coming!

Content you might like

Always required – Security must formally review and approve every change request.11%

Required for security-impacting changes – Security reviews only changes flagged as having potential security implications. Please comment : Who decides which changes require security review and which do not ? Is this determination manual or automated? How do you avoid gaps or oversights in this process ?81%

Not required – Security does not review changes submitted CAB/RAB by other teams. 7%

Risk-based or automated – Security involvement is determined by a tiered model or automated risk scoring within ITSM.

View Results

AI-driven threats (deepfakes, automated attacks) 19%

Software supply chain risks 19%

Insider risk (both malicious & accidental) 10%

Regulatory compliance 9%

Cloud misconfigurations 12%

Shadow IT (or shadow AI) 12%

Ransomware 6%

Talent shortage in cybersecurity10%

Something else (comment to explain)4%

View Results