Authentic8's SaaS Web Browser Offers Document Productivity and Content Rendering

Authentic8 gives organizations the ability to control an end user’s web browsing experience by deploying the actual web browser app using the cloud.
By taking this siloed approach to web browsing, industries can ultimately insulate their entire networks from external threats. Since all the content that your end users view is through being viewed through the cloud based web browser, businesses can ensure that the desktop computing environment stays completely segregated from the web browser, which reduces the attack surface for businesses.
Authentic8 has expanded on their cloud deployed web browser offerings by giving businesses the opportunity to edit documents such as PDFs directly within the Authentic8 web browser session.
“Office files, like PDF documents, can include malicious executables or scripts which can lead to exploits,” says Ramesh Rajagopal, co-founder of Authentic8.
“This malicious code, combined with a vulnerability in the application that renders the document, can lead to exploits that bypass traditional enterprise controls. Using Silo to save, preview and convert benign copies creates a perfect insulation layer between the user and the influx of untrustworthy or unknown file objects,” Rajagopal added.
This technology will become handy within corporate settings, government networks and academia, as data security and network diversity are hot topics within these sectors.
Using Authentic8’s storage capabilities, businesses can upgrade their plan to securely store their files in the cloud. Administrators are able to granularly grant access rights to certain resources, giving organizations flexibility in the way they delegate access.
Authentic8 is providing these features to its end users at no additional cost. By being able to increase productivity inside of a cloud based browser, businesses can be assured that viruses, malware and trojans do not have a method of using a legitimate looking document as a means of spreading malicious code.