Manage browser add-ons.

Each internet browser has a unique add-on ecosystem. Internet Explorer uses plug-ins, Browser Helper Objects (BHOs), and accelerators; Google Chrome has extensions, themes, and apps; and Firefox is all about extensions. These unique add-on ecosystems have been evolving for some time, up until the point where it's now almost impossible for IT administrators to keep track of the various add-ons deployed on each user's computer.

Browser Security Plus makes the impossible possible with its Add-on Management feature.

Note: Chrome extensions and Internet Explorer plugins can be managed using Add-on Management. Chrome extensions can be distributed to computers using Extension Repository.

Detect add-ons present in your organization.

Compared to other types of add-ons, plug-ins are the most dangerous. Thankfully, browser developers have introduced plug-in signatures to ease consumers' safety concerns and provide accountability in the event of a security breach. With Browser Security Plus, you can detect which plug-ins are signed and which aren't.

Extensions, the most frequently used type of add-on, are capable of tracking users' browser history. To do that, these extensions require permissions. Once extensions have permissions like "web request" and "native messaging", they can steal browser history, browsing patterns, and data entered in webpages by users. With Browser Security Plus, you can detect the permissions used by each extension. Disable chrome extensions that use permissions that could lead to data loss.

Detect outdated plug-ins.

Plug-in developers provide fixes and updates when security loopholes are detected. With Browser Security Plus, you can detect which plug-ins need updates to make sure employees' browsers are as secure as possible.

Manage add-ons.

  • Distribute extensions.
  • Many organizations use productivity-boosting extensions for managing passwords, enhancing emails, and correcting grammar on a daily basis. Distribute these extensions silently to computers using our Extension Repository.

  • Disable Chrome extensions and IE plugins.
  • Certain websites install plug-ins without visitors' knowledge; this is one of the most common ways unwanted plug-ins land on computers. These kinds of plug-ins need to be blacklisted once they're detected.

    Many employees also access corporate resources while signed in to their personal browser account, bringing their extensions with them. That means these extensions can access enterprise sites, which is likely to lead to corporate data loss.

    The best way to deal with any type of unwanted extension? Disable Chrome extensions with Browser Security Plus, and only grant access to IT approved extensions.

To manage browser add-ons and secure your network, download a free, 30-day trial of Browser Security Plus and try out these features for yourself.