• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
sase solutions fall short without enterprise browser extensions, new report

SASE Solutions Fall Short Without Enterprise Browser Extensions, New Report Reveals

You are here: Home / General Cyber Security News / SASE Solutions Fall Short Without Enterprise Browser Extensions, New Report Reveals
March 27, 2024

As SaaS applications dominate the business landscape, corporations need optimized network pace and robust security measures. Many of them have been turning to SASE, a products category that presents cloud-based mostly network protection whilst maximizing network infrastructure efficiency.

Nevertheless, a new report: “Much better With each other: SASE and Company Browser Extension for the SaaS-Initially Company” (Download below), worries SASE’s ability to supply complete security in opposition to web-borne cyber threats on its very own. From phishing attacks to destructive extensions and account takeovers, conventional network traffic evaluation and security falls small. The report sheds light on these restrictions and introduces the function of secure browser extensions as an essential element in a thorough security approach.

SASE Advantages and Limitations

SASE will take on a dual role in addressing equally infrastructure and security. Having said that, even though SASE presents apparent strengths in security, it could not entirely go over the expanse of the web-borne threat landscape. SWG, CASB, and NGFW are not a silver bullet to all the security requires of the SaaS-first group, even when they are packaged as SASE.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The modern-day danger landscape is shaped by the centrality of the browser as a main operating house. These new threats leverage the browser as a bridge among the unit and organizational resources and goal to gain malicious access to the corporation by means of phishing, destructive extensions, and account takeover, to identify a couple of. While SASE is created to protect the perimeter from threats that endeavor to enter it, this new threat landscape relies on targeted visitors from the browser to a SaaS app or internet site, which SASE does not fully go over.

Bridging the Hole with Safe Browser Extensions

Protected browser extensions complement SASE’s network security measures. By deep session assessment and proactive danger avoidance, these extensions supply granular visibility and true-time safety in opposition to advanced web-borne threats, proficiently addressing the gaps left by SASE.

SASE vs. Safe Browser Extensions: 3 Use Circumstances

How do the dissimilarities in between SASE and protected browser extensions perform out when it arrives to real threats? The report gives three use circumstances.

1. Phishing

  • SASE limits: SASE’s NGFW or SWG lacks visibility into the precise session, leaving it to count on regarded destructive addresses or emulate the session in a digital environment. As a final result, SASE misses ~60% of malicious web web pages. It also is unable to detect webpages that disable their phishing exercise when executed in a digital atmosphere.
  • The resolution: A secure browser extension provides granular visibility into the dwell session, enabling the monitoring of destructive components in the phishing web site and disabling them in actual time.

2. Malicious Extensions

  • SASE limitations: SASE’s NGFW or SWG lacks the capability to detect and block outbound targeted traffic generated by any destructive extensions.
  • The answer: The secure browser extension gives visibility into the browser and detects and disables all extensions that introduce a data exfiltration risk.

3. Account Takeover

  • SASE restrictions: SASE’s CASB lacks visibility into complicated, modern day web apps and depends on the app’s API, restricting safety to sanctioned applications.
  • The answer: The secure browser extension integrates with the organizational identification supplier and acts as an additional authentication factor. Access is attainable only from a browser that has the extension.

With SaaS app utilization getting to be dominant, the extra significant the job of the browser turns into – and the danger landscape it encounters will raise. Can corporations dismiss the dangers that derive from the modern browser? According to LayerX, network security is insufficient on its personal, and they connect with for complementary actions that can handle SASE’s gaps.

To browse more about how to get serious-time safety versus this evolving risk with a secure browser extension, read through the entire report.

Located this short article appealing? This write-up is a contributed piece from one of our valued companions. Adhere to us on Twitter  and LinkedIn to go through additional distinctive material we post.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «critical unpatched ray ai platform vulnerability exploited for cryptocurrency mining Critical Unpatched Ray AI Platform Vulnerability Exploited for Cryptocurrency Mining
Next Post: Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions microsoft edge bug could have allowed attackers to silently install»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.