Island Description

Island gives the enterprise complete control over the browser. This allows for greater visibility, governance, and productivity. You can control where and when users copy/paste data into or out of applications, check device posture before granting access to an application, prevent unauthorized screen captures from being taken, manage extension permissions, workflow enforcement. Policy-based storage, network tag, geo-fencing, policy-based storage, policy-based storage, policy-based management, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow enforcement, workflow execution, workflow enforcement, workflow enforcement, work flow enforcement, workflow enforce, workflow compliance, You need to understand the whole story of user activity and experience. You can trace incidents down to the user's device, time and place. All browser data can be fed into your analytics platforms, so you have all the information you need. You can customize Island to reflect your company's brand, messaging, or workflows. Even insert browser-based RPA scripts can be used to protect sensitive data according to your specific governance requirements. Island is built on Chromium. This open-source project powers Chrome, Edge and other major browsers.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Island
Headquarters:
United States
Website:
www.island.io/product
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Type of Training
Documentation
Webinars
Videos
Customer Support
Online

Island Features and Options

Computer Security Software

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection