Armored Browser

Delivers a locked-down, cross-platform, customised tool that crucially incorporates SentryBay’s patented anti-keylogging and anti-phishing technology.

arrange a demo

Armored Browser

For rapid deployment and immediate protection against cyber-attacks the Armored Browser delivers a locked-down, cross-platform, customised tool that crucially incorporates SentryBay’s patented anti-keylogging and anti-phishing technology.

Armored Browser provides secure access and use of SaaS applications used by multiple sectors including online banking, brokerage, wealth management, insurance, healthcare, government and eCommerce.

The solution wraps the designated application, provides designated browser tabs and looks like a dedicated application rather than a browser. It also loads the application more quickly as well as more securely, to promote ease of use.

To guard against the threat of keylogging, SentryBay software replaces the actual keystrokes with fake random keys which the keylogger malware receives – displayed as a ‘data scrambler’ – to demonstrate the protection provided.

CUSTOMER STORY

Most secure – yet simple - method of accessing SaaS and web applications.

Works seamlessly on BYOD and BYOPC devices – easily deployed for employees and customers alike.

Fully customisable – branding, tabs, whitelists etc.

Armored Browser protects end users against the following common threats:

• Man-in-the-Browser – by blocking third party extensions, developer tools and APIs from interacting with the browser session

• Man-in-the-Middle - checks Certificate issuers against whitelisted domains to block these attacks

• Malware on the endpoint – by blocking data being captured via keylogging and screen scraping malware on the endpoint

With no integration required at the enterprise back-end, deployment is rapid so if you want to customise or white label the solution for customers this can be executed quickly and efficiently.  The Armored Browser includes the SentryBay Management Portal, which allows you to configure tasks such as changing the browser URLs and whitelisting. The solution also leaves no trace upon closing, providing further security benefits.

Related Products

explore products

Related News & Resources