Protect On Q v2.7
September 03, 2012
c£21 per user per year
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Added security to web browsing and provides protection to any PC used with a near-zero footprint on the device
- Weaknesses: Limited endpoint protection features and reporting
- Verdict: Not a full-featured endpoint offering; a good web app protection tool
Protect On Q (POQ) v2.7 from Quarri Technologies is a security software solution that empowers organisations to protect browser-delivered content from compromise on the endpoint.
POQ enables IT professionals to deliver and enforce secure web sessions on-demand that prevent the unauthorised use and replication of confidential data while it is in transport and use. The solution works by protecting web sessions from pre-authentication to logout, with minimal installation requirements and without leaving installed software behind on the accessing device.
The POQ-hardened browser shields sensitive data from keyloggers, frame grabbers, session hijackers, cache miners and other malware, while blocking inbound attacks as well. POQ also enables organisations to enforce security policies that prevent end-users from copying, saving, printing or screen-capturing browser-delivered data, including from browser-launched processes such as Adobe Reader, Microsoft Office and ZIP files.
POQ is delivered on-the-fly when end-users log in, ensuring privacy by encrypting session data, including cached files, cookies, password store and history. All session data is overwritten and deleted at the end of the session. What's more, POQ also protects against session hijacking by controlling all browser networking.
Before installation of the POQ application, Java and Apache Tomcat (or another Java servlet container) must be installed and operating. The manager installs into Tomcat 6+ or other servlet engines with Java 6+. The server also installs into Tomcat 6+ or other servlet engines with Java 6+. After Java and Tomcat are installed, the POQ server and manager installation is fairly straightforward. One downloads and copies the WAR files into the Tomcat web apps directory, restarts and then accesses the console via a browser through the local host address.
The first thing one sees in the console is the policy screen. Administrators use the policy manager to create policies and set the default protections through the security settings that control how POQ will handle - and prevent - malware.
POQ enables organisations to define security policies that deliver application-specific settings that are packaged with the binary Enforcer components. The provisioning server can be the web application server or a remote standalone server.
POQ enforces security only in the protected session. No other browser instances or applications are affected. POQ integrates directly with web servers or with popular web gateway frontends.
The product can be configured to either be optional (the end-user clicks a link on a web page to start the protected session) or required (the end-user must be running a POQ browser in order to access the web resources).
Documentation is good and helped us through the install and configuration activities.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- Same fate befalls Post Office broadband as hit DT?
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Former Expedia IT employee admits to hacking execs from the inside
- Cyber-insurance: What will you be able to claim for and is it worth it?
- Levelling the playing field against targeted attacks
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime
- IoTSF conference: EU should become de facto regulator