Many banks, ecommerce and other firms who have web-accessible information and accounts to protect are waiting for the day when they don’t have to worry about attacks against their customers’ browsers and end points. Man-in-the-browser attacks (e.g. Zeus/SpyEye) are very much alive and well, and causing all kinds of problems amongst many of the companies I speak with.
Secure browsing is one option that could really help. And recently, I’ve been hearing about various innovative engineering feats that could get us there. For example, today I heard that the largest private bank in the world, conveniently located in Switzerland, is about to roll out USB-plug-in transaction signing devices that come with a proprietary locked down browser which communicates with the device’s firmware along with the bank’s server. This browser is also downloadable to a user’s PC and usable without any installation.
Swiss ebanking technology provider, CREALOGIX E-Banking, has been working with its privacy and security zealous banking clients on this technology for many years. There are several variations on this theme coming to market, and already in the market (See our research note “Tompkins Financial Distributes IronKey Locked-Down Secure Computing Devices to Banking Customers”). Interestingly, another Swiss bank, UBS distributed similar USB-pluggable devices from IBM to its corporate customers. And for the first time, we are starting to get earnest client interest in these options, as they wrestle with the man-in-the-browser attacks and need quick solutions for their complex legacy environments.
These devices, and even the software versions of the proprietary browsers, should go a long way towards keeping men out of our browsers.
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
The Mobile Scenario: Taking Mobility to the Next Level
The definition of "mobile" in the post-app era will involve new interactions such as bots and conversations, new devices such as wearables...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.