Best IT Security Software for Chromium

Find and compare the best IT Security software for Chromium in 2024

Use the comparison tool below to compare the top IT Security software for Chromium on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Kasm Workspaces Reviews
    Top Pick

    Kasm Technologies

    $0 Free Community Edition
    121 Ratings
    See Software
    Learn More
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 2
    Cloaked Reviews

    Cloaked

    Cloaked

    $10 per month
    Create unlimited identities to make your data invisible. The next level of privacy protection online and for travel. Create virtual identities and unique contact information to replace your personal data. {Every website, company, or person can have a stored identity you can use forever or delete anytime.|You can store an identity for any website, company or person. You can use it forever or delete it at any time.} Cloaked is a great way to protect your personal information. Available for Chromium-based browsers such as Google Chrome and Brave. One tap is all it takes to create identities using the mobile app. Sign in anywhere using your mobile device or browser. The generated phone numbers are routed through an encrypted server, making your personal number inaccessible to recipients. Unique sets of login and contact credentials that protects your personal information. It's impossible for businesses to create a central profile of you with unique identities. Unlock powerful features that will keep your communication organized.
  • 3
    Ads Killer Reviews

    Ads Killer

    Ads Killer

    Free
    Blocks banners, text ads and video ads. Ads Killer, Freedom from online ads! Are you tired of annoying ads? You want an extension that is simple and straightforward, with no confusing settings. Ads Killer blocks nearly all types of advertising on the Internet. Ads Killer works instantly. Just click "install" to go to any site and ads will be immediately blocked. Blocks all ads including banners and text ads as well as rich media (animated ads), pop ups, and web bugs tracking systems. It speeds up page loading and saves visitors traffic by not wasting time downloading ads. Protects against malicious and fraudulent websites. Ads Killer updates more frequently than other blockers so new ads won't bother your eyes. Protection against Internet bugs and surveillance. Advertising companies won't be able to track you anymore. Ads Killer doesn't ask for personal information. It also does not monitor your online activities.
  • 4
    Island Reviews
    Island gives the enterprise complete control over the browser. This allows for greater visibility, governance, and productivity. You can control where and when users copy/paste data into or out of applications, check device posture before granting access to an application, prevent unauthorized screen captures from being taken, manage extension permissions, workflow enforcement. Policy-based storage, network tag, geo-fencing, policy-based storage, policy-based storage, policy-based management, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow execution, workflow enforcement, workflow enforcement, work flow enforcement, workflow enforce, workflow compliance, You need to understand the whole story of user activity and experience. You can trace incidents down to the user's device, time and place. All browser data can be fed into your analytics platforms, so you have all the information you need. You can customize Island to reflect your company's brand, messaging, or workflows. Even insert browser-based RPA scripts can be used to protect sensitive data according to your specific governance requirements. Island is built on Chromium. This open-source project powers Chrome, Edge and other major browsers.
  • 5
    SURF Security Reviews
    Create a security gap, reduce the attack surface, and isolate your business against internal and external exploits while streamlining SaaS applications and accessing your information. Access to SaaS and on-premise apps is granted based on user identity and device. By encrypting content, sandboxing it, and rendering it, you can isolate your work environment from web and device threats. Enforcing enterprise security policies such as DLP, web filters, phishing protection and extension management. SURF applies Zero-Trust principles via the browser to protect everyone and everything within the enterprise, regardless of their role. By configuring a few policies, the IT and security teams are able to reduce the attack surface. Learn the benefits of using SURF in an information technology perspective.
  • Previous
  • You're on page 1
  • Next