Browser security

Browser security: Surf the net securely

Secure your browser against dangers from the net

In today's world, surfing the Internet is part of both our private and professional life. However, the browser required for this is increasingly serving cyber criminals as a gateway for malware. Traditional security barriers, such as antivirus software, offer little protection: many viruses often break through them effortlessly because they remain undetected. Learn more about browser security. Get to know the benefits of a fully virtualized browser.

Internet browser security: the browser as a vulnerability

In the digital age, viruses are a highly dangerous evil. These are examples that represent high risk potential and where browser security tools are important:

  • Emails with broken links
  • Unpatched applications
  • Lack of system or software updates

In order to gain access to a computer, hackers only need internet users because the greatest weakness of any IT security architecture is the browser. The main entry points for cyber criminals are active contents on Internet pages such as JavaScript, Java, Flash or HTML 5. These programming interfaces allow hackers to access the user's PC. The problem is that the website executes the malicious software simply when it is simply loaded.

Learn more about the fully virtualized R&S®Browser in the Box in use

R&S®Browser in the Box: Safer surfing in a virtual environment

  • Internet browser security for surfing and email, including attachments (Windows 7, 8.1, 10)
  • Secure separation of Internet, operating system and corporate network
  • R&S®Browser in the Box integrated in either Firefox or Chrome
  • For workstations and central virtualization servers (thin clients)
  • Developed in cooperation with the Federal Office for Information Security (BSI)
  • Proactive browser security that protects against browser-based cyber-attacks (APTs, zero-day exploits, ransomware)
  • High user-friendliness: recognition value compared to the established browser

Learn more about the fully virtualized R&S®Browser in the Box in use.

How to apply internet browser security: 5 basic recommendations

  • When choosing a browser, make sure that it is equipped with security updates and sandbox technology.
  • Refrain, as far as possible, from using active content such as Java.
  • If you cannot do without active content, generally switch it off and only activate it on trusted sites.
  • Most common browsers have integrated phishing and malware protection. Make sure that this it is activated.
  • Data protection is also important: In every common browser, you can adjust settings such as cookies or tracking manually. This way you leave fewer data traces on the internet.

Additional tip: Add-ons for more browser security

  • There are browser add-ons, which can additionally strengthen the security of your browser.
  • The extension "HTTPS Everywhere" ensures that only securely encrypted content is loaded.
  • All data transfer to Facebook can be blocked with "Disconnect for Facebook".
  • The "Click & Clean" add-on removes all traces of your Internet visits in the form of cookies, cache, passwords or form data.
  • The "Privacy Badger" also provides more anonymity when surfing the web and blocks advertising banners.

Browser security through virtualization

However, the measures described above only provide a minimum level of protection for the users of a browser. One browser security tool is concept of virtualization provides real protection. This is a "digital" quarantine in the figurative sense: malware is isolated before the browser is able to execute it. Instead of detecting malicious code - as is the case with antivirus programs – virtualization prevents execution right from the start. All potentially dangerous activities are isolated in a closed virtual browser.

Micro- vs. full virtualization

There are two types of virtualization: full and micro virtualization. While micro-virtualization is cheaper and requires less storage space, full virtualization offers better protection. Keep on reading and learn more about the differences of virtualization and what its advantages and disadvantages are.

Micro-virtualization: browser security with possible gaps

With so-called micro-virtualization, a certain operating system - usually Windows - runs on the computer. This is where the central problems of micro-virtualization lie:

  • Micro-virtualization is not based on a separate operating system. Instead, it is interlocked with the existing operating system.
  • All activities take place in the same kernel.
  • The same Windows programs are used. The host system shares at least one kernel and optionally many other components.

Conclusion: Thus, micro-virtualization is less expensive than full virtualization and requires less memory on the computer. However, it leaves security gaps open. If the kernel is infected with malware, this also applies to all micro-virtual machines. AND: Almost 90 % of all attacks are Windows-based.

Browser security: consistent network separation through full virtualization

Best internet browser security is offered by fully virtualized surfing environments. These are the advantages and offer a proactive browser security check:

  • In a fully virtualized environment, both the client's host operating system and the intranet work independently.
  • Intruding malware remains trapped in the virtual environment and cannot spread on the computer and in the local network.
  • You always restart the browser in a virus-free state.
  • By isolating the intranet, malicious code cannot penetrate the internal network, even in case of an attack.
  • Use different operating systems: switch the browser to Linux. With two percent attacks on the system, Linux offers few loopholes. It is ideal for achieving more browser security.

If you have further questions, please contact us.

Related downloads

Webinar: Emotet, Phishing und Co.

Download now

E-Book: Browser in the Box

Download now

White paper: Browsers as entry points for cyberattacks

Download now

Case study: Stadt Dresden

Download now


What is a secure browser?

Browser security has sandbox technology and regular security updates. With adjusted settings, all common browsers are relatively secure. But: The best security features are ineffective if the user hangs around on dubious websites, opens links in suspicious e-mails, installs software from questionable sources or is careless with his passwords. The best internet browser security tool is a virtualized browser can protect against user errors.

Which browser is best for online banking?

When conducting banking transactions on the Internet, we disclose very sensitive data. Therefore, you should pay attention to appropriate browser security. In principle, you can do online banking with any standard browser such as Microsoft Internet Explorer, Apple Safari, Mozilla Firefox or Google Chrome. In any case, please make sure that your operating system and browser have the latest updates.

Which browser is the most secure?

Common browsers don’t offer one hundred percent browser security. It is therefore important to install new updates for the selected browser as soon as they are released. In addition, most browsers offer different security levels - it is always advisable to choose the full security level. The safest browsers are those that work with full virtualization. This prevents malware from inadvertently downloading into the internal network, for example. And ransomware cannot connect to the Internet with a fully virtualized browser to download the "real" malware.

Your monthly cybersecurity update

Your monthly cybersecurity update

Contact Us

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

Marketing permission

I want to receive information from Rohde & Schwarz via

What does this mean in detail?

I agree that Rohde & Schwarz GmbH & Co. KG and the Rohde & Schwarz entity or subsidiary company mentioned in the imprint of this website, may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the Statement of Privacy.

Your request has been sent successfully. We will contact you shortly.
An error has occurred, please try again later.