Could you give me a bit more information on Google Chrome Frame security? Our organization operates several legacy
applications that have to run on outdated versions of IE. Is Google Chrome Frame a viable way to bolster security across the enterprise?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Google Chrome Frame is a plug-in for Internet Explorer versions 6-9 that gives users “access to the latest HTML5 features as well as Google Chrome’s performance and security features.” Google Chrome Frame will improve the security of older browsers when visiting a website that opts to use the plug-in, but won’t affect the security for the rest of the Internet. This allows users to continue to use their current version of Internet Explorer while benefiting from the functional advantages of Google Chrome Frame. This will not significantly improve security, since it is unlikely that a malicious website will target Google Chrome Frame to exploit rather than exploiting the version of Internet Explorer in use.
There is a similar project called IE Tab that may improve security more than Google Chrome Frame. IE Tab is a Web browser plug-in for Google Chrome or Firefox that uses Internet Explorer to display a webpage in a tab in Chrome. It can be configured so IE Tab always opens certain URLs, such as your legacy applications or websites requiring IE. This sets the system so IE can still be used for some trusted websites, although employees are no longer browsing the Internet using old versions of Internet Explorer. Users may benefit from using a more secure Web browser and still sustain the advantages of an older, more insecure version of Internet Explorer.
Dig deeper on Web Browser Security
Related Q&A from Nick Lewis, Enterprise Threats
Expert Nick Lewis explains how to keep call center employees from getting duped by social engineering scams and pretexting.continue reading
Researchers reportedly succeeded in extracting decryption keys using sound-based attacks. Is this a threat enterprises should worry about?continue reading
The amount of malware using peer-to-peer communications has increased dramatically. Enterprise threats expert Nick Lewis explains how to detect P2P ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.