Could you give me a bit more information on Google Chrome Frame security? Our organization operates several legacy...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
applications that have to run on outdated versions of IE. Is Google Chrome Frame a viable way to bolster security across the enterprise?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Google Chrome Frame is a plug-in for Internet Explorer versions 6-9 that gives users “access to the latest HTML5 features as well as Google Chrome’s performance and security features.” Google Chrome Frame will improve the security of older browsers when visiting a website that opts to use the plug-in, but won’t affect the security for the rest of the Internet. This allows users to continue to use their current version of Internet Explorer while benefiting from the functional advantages of Google Chrome Frame. This will not significantly improve security, since it is unlikely that a malicious website will target Google Chrome Frame to exploit rather than exploiting the version of Internet Explorer in use.
There is a similar project called IE Tab that may improve security more than Google Chrome Frame. IE Tab is a Web browser plug-in for Google Chrome or Firefox that uses Internet Explorer to display a webpage in a tab in Chrome. It can be configured so IE Tab always opens certain URLs, such as your legacy applications or websites requiring IE. This sets the system so IE can still be used for some trusted websites, although employees are no longer browsing the Internet using old versions of Internet Explorer. Users may benefit from using a more secure Web browser and still sustain the advantages of an older, more insecure version of Internet Explorer.
Dig Deeper on Web Browser Security
Related Q&A from Nick Lewis
IP devices like multifunction printers and faxes may be an attack vector. Expert Nick Lewis explains the vulnerabilities, and how to secure them ...continue reading
AceDeceiver is a Trojan that can install itself on iOS devices without any certificates. Expert Nick Lewis explains how it works, and how enterprises...continue reading
USB Thief, a new type of stealth malware, leaves no trace on air-gapped targets. Expert Nick Lewis explains how the malware works and how enterprises...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.