WorkSpaces Secure Browser provides a protected environment for users to access private websites, software-as-a-service (SaaS) applications, and the public internet. WorkSpaces Secure Browser works with the browser running locally on the end-user’s device. Encrypted pixels are streamed from a remote browser session, with full policy enforcement, running in the AWS cloud. WorkSpaces Secure Browser starts at just $7 per month and eliminates the need for IT to manage specialized client software, infrastructure, and virtual private network (VPN) connections.
Benefits
Improve security controls and monitoring
Enhance security by controlling browser policies and trusted devices with network access. Closely monitor configuration changes, session availability and performance, and granular user access logs.
Protect data
Sensitive corporate data never touches the end user's device, helping prevent the risk of unauthorized data exfiltration.
Simplify management
Easily create and centrally manage resources and automatic workflows without needing to provision physical infrastructure.
Reduce costs
Starting at $7 per month, WorkSpaces Secure Browser provides cost-effective, helps provide access to web-based resources.
Support bring-your-own-device (BYOD) initiatives
Since WorkSpaces Secure Browser works with the web browser already installed on the end- user device, it’s ideal for organizations looking to reduce cost through a bring-your-own-device (BYOD) initiative.
Use Cases
Empower customer support and back-office workers
Provide customer support agents and back-office employees with access to web-based applications, internal portals, and communications tools.
Enable bring-your-own-device (BYOD)
By eliminating the need for specialized client software and a VPN connection, WorkSpaces Secure Browser enables remote and hybrid workers to easily use their personal devices for secure access to company resources.
Create secure data and analytics environments
Enable employees and customers to run analytics on large volumes of sensitive data in a tightly controlled environment, with integrated identity management and policies in place that block use of clipboard, printer, file transfer, to reduce the risk of data exfiltration.
Isolate high-security networks form the public internet
Enable safe browsing on the public internet with an effective barrier against web-based attacks for users like law enforcement agents, government employees, and financial service providers. Provide business users with sandbox access to web-based Generative Artificial Intelligence (GenAI) tools.
Optimize cost
Right-size virtual desktop service for use cases that only require secure access to web applications and the public internet, only paying for the resources you use.