RISKY BROWSER EXTENSIONS PROTECTION

Block malicious or risky extensions to protect passwords, cookies, identities, and other browser-stored data from compromise

Detect and block risky extensions

Scan your workforce browsers to discover installed malicious extensions that should be removed.

Monitor extension behavior

Continuously analyze the behavior of existing browser extensions to prevent them from accessing sensitive browser data.

Proactively mitigate identity theft

Block adversaries from gaining access to the wide range of credential data that’s stored in your browser, to prevent MFA bypass and potential account takeover.

Discover malicious extensions

Configure policies to continuously scan your workforce devices for newly installed browser extensions, determine whether they are allowed, and alert the IT and security teams if a risky extension is in place.

Disable extensions’ malicious activity

Disable extensions’ ability to extract credentials or other sensitive data from your workforce’s browsers. These proactive policies ensure that even when malicious extensions are not yet removed, their ability to cause harm is disabled.