Overtis tracks worker behaviour in browsers

Overtis' new browser add-on is designed to bring granular security controls to administrators.

Browser

Overtis has launched a browser add-on enabling IT administrators to monitor worker behaviour and enforce compliance.

The VigilancePro Web Application Manager provides granular controls and can even hide certain content on the browser, such as sensitive data or tabs.

Administrators can use the tool to manage worker controls as well, including copy and paste as well as printing, to prevent any insider threat from damaging their business.

The Overtis plug-in can also enable single sign on for users wherever they are accessing web applications.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Currently, the add-on is only compatible with Firefox and Internet Explorer, although Google Chrome and Safari versions are on the way.

The basic interface has been designed to ensure administrators don't find themselves overwhelmed, but Overtis chief executive (CEO) Ed Macnair told IT PRO the firm was planning to "sex-up" the control screen.

To make administering the product even quicker, Macnair explained how businesses could simply drag their worker directory into the add-on, claiming it would take around an hour to transfer 5,000 users over.

"Traditional web parameters have disappeared," Macnair added.

"With the consumerisation of IT it's all changed it's the evolution of the endpoint. The iPad was the next big evolution in four to six months you saw it in the enterprise."

Businesses will be required to pay $10 (6.23) per user, per month to access the VigilancePro Web Application Manager.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/google-android/34657/android-gets-new-security-sandboxing-features
Google Android

Android gets new security sandboxing features

18 Oct 2019
Visit/security/28014/how-to-enable-private-browsing
web browser

How to enable private browsing on any browser

25 Jun 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
Visit/policy-legislation/general-data-protection-regulation-gdpr/354577/data-protection-fines-hit-ps100m
General Data Protection Regulation (GDPR)

Data protection fines hit £100m during first 18 months of GDPR

20 Jan 2020